RHSA-2016:1996

Vulnerability from csaf_redhat - Published: 2016-10-04 14:26 - Updated: 2025-11-21 17:57
Summary
Red Hat Security Advisory: CFME 4.1 bug fixes and enhancement update
Severity
Important
Notes
Topic: Updated cfme packages that fix bugs and add various enhancements are now available for Red Hat CloudForms 4.1. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details: Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller (MVC) framework for web application development. Action Pack implements the controller and the view components. * An input validation flaw was found in the way CloudForms regular expressions were passed to the expression engine via the JSON API and the web-based UI. A user with the ability to view collections and filter them could use this flaw to execute arbitrary shell commands on the host with the privileges of the CloudForms process. (CVE-2016-7040) This issue was discovered by Tim Wade (Red Hat). Additional Changes: This update fixes bugs and adds various enhancements. Documentation for these changes is available in the Release Notes linked to in the References section. All CFME users are advised to upgrade to these updated packages, which correct these issues and add these enhancements.
Terms of Use: This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

An input validation flaw was found in the way CloudForms regular expressions were passed to the expression engine via both the JSON API and the web based UI. A user with the ability to view collections and filter them could use this flaw to execute arbitrary shell commands on the host with the privileges of the CloudForms process.

CWE-20 - Improper Input Validation
Vendor Fix Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2016:1996
References
https://access.redhat.com/errata/RHSA-2016:1996 self
https://bugzilla.redhat.com/show_bug.cgi?id=1374815 external
https://bugzilla.redhat.com/show_bug.cgi?id=1375089 external
https://bugzilla.redhat.com/show_bug.cgi?id=1375205 external
https://bugzilla.redhat.com/show_bug.cgi?id=1375311 external
https://bugzilla.redhat.com/show_bug.cgi?id=1375326 external
https://bugzilla.redhat.com/show_bug.cgi?id=1375330 external
https://bugzilla.redhat.com/show_bug.cgi?id=1376167 external
https://bugzilla.redhat.com/show_bug.cgi?id=1376168 external
https://bugzilla.redhat.com/show_bug.cgi?id=1376169 external
https://bugzilla.redhat.com/show_bug.cgi?id=1376170 external
https://bugzilla.redhat.com/show_bug.cgi?id=1337552 external
https://bugzilla.redhat.com/show_bug.cgi?id=1337577 external
https://bugzilla.redhat.com/show_bug.cgi?id=1376173 external
https://bugzilla.redhat.com/show_bug.cgi?id=1348649 external
https://bugzilla.redhat.com/show_bug.cgi?id=1349059 external
https://bugzilla.redhat.com/show_bug.cgi?id=1349423 external
https://bugzilla.redhat.com/show_bug.cgi?id=1351332 external
https://bugzilla.redhat.com/show_bug.cgi?id=1352016 external
https://bugzilla.redhat.com/show_bug.cgi?id=1353291 external
https://bugzilla.redhat.com/show_bug.cgi?id=1354503 external
https://bugzilla.redhat.com/show_bug.cgi?id=1357865 external
https://bugzilla.redhat.com/show_bug.cgi?id=1358323 external
https://bugzilla.redhat.com/show_bug.cgi?id=1361175 external
https://bugzilla.redhat.com/show_bug.cgi?id=1361176 external
https://bugzilla.redhat.com/show_bug.cgi?id=1361178 external
https://bugzilla.redhat.com/show_bug.cgi?id=1361693 external
https://bugzilla.redhat.com/show_bug.cgi?id=1362227 external
https://bugzilla.redhat.com/show_bug.cgi?id=1362627 external
https://bugzilla.redhat.com/show_bug.cgi?id=1362631 external
https://bugzilla.redhat.com/show_bug.cgi?id=1362634 external
https://bugzilla.redhat.com/show_bug.cgi?id=1362704 external
https://bugzilla.redhat.com/show_bug.cgi?id=1363753 external
https://bugzilla.redhat.com/show_bug.cgi?id=1363754 external
https://bugzilla.redhat.com/show_bug.cgi?id=1371979 external
https://bugzilla.redhat.com/show_bug.cgi?id=1371980 external
https://bugzilla.redhat.com/show_bug.cgi?id=1371981 external
https://bugzilla.redhat.com/show_bug.cgi?id=1372413 external
https://bugzilla.redhat.com/show_bug.cgi?id=1372775 external
https://bugzilla.redhat.com/show_bug.cgi?id=1372801 external
https://bugzilla.redhat.com/show_bug.cgi?id=1376141 external
https://bugzilla.redhat.com/show_bug.cgi?id=1376143 external
https://bugzilla.redhat.com/show_bug.cgi?id=1376144 external
https://bugzilla.redhat.com/show_bug.cgi?id=1377416 external
https://bugzilla.redhat.com/show_bug.cgi?id=1377420 external
https://access.redhat.com/security/updates/classi… external
https://bugzilla.redhat.com/show_bug.cgi?id=1343517 external
https://bugzilla.redhat.com/show_bug.cgi?id=1343717 external
https://bugzilla.redhat.com/show_bug.cgi?id=1343719 external
https://bugzilla.redhat.com/show_bug.cgi?id=1346953 external
https://bugzilla.redhat.com/show_bug.cgi?id=1346989 external
https://bugzilla.redhat.com/show_bug.cgi?id=1346990 external
https://bugzilla.redhat.com/show_bug.cgi?id=1347278 external
https://bugzilla.redhat.com/show_bug.cgi?id=1347330 external
https://bugzilla.redhat.com/show_bug.cgi?id=1347692 external
https://bugzilla.redhat.com/show_bug.cgi?id=1348631 external
https://bugzilla.redhat.com/show_bug.cgi?id=1348637 external
https://bugzilla.redhat.com/show_bug.cgi?id=1348644 external
https://bugzilla.redhat.com/show_bug.cgi?id=1348648 external
https://bugzilla.redhat.com/show_bug.cgi?id=1363891 external
https://bugzilla.redhat.com/show_bug.cgi?id=1364222 external
https://bugzilla.redhat.com/show_bug.cgi?id=1364501 external
https://bugzilla.redhat.com/show_bug.cgi?id=1366358 external
https://bugzilla.redhat.com/show_bug.cgi?id=1366596 external
https://bugzilla.redhat.com/show_bug.cgi?id=1366597 external
https://bugzilla.redhat.com/show_bug.cgi?id=1366598 external
https://bugzilla.redhat.com/show_bug.cgi?id=1366599 external
https://bugzilla.redhat.com/show_bug.cgi?id=1368165 external
https://bugzilla.redhat.com/show_bug.cgi?id=1368167 external
https://bugzilla.redhat.com/show_bug.cgi?id=1368168 external
https://bugzilla.redhat.com/show_bug.cgi?id=1368170 external
https://bugzilla.redhat.com/show_bug.cgi?id=1369583 external
https://bugzilla.redhat.com/show_bug.cgi?id=1370196 external
https://bugzilla.redhat.com/show_bug.cgi?id=1370198 external
https://bugzilla.redhat.com/show_bug.cgi?id=1370202 external
https://bugzilla.redhat.com/show_bug.cgi?id=1370208 external
https://bugzilla.redhat.com/show_bug.cgi?id=1370209 external
https://bugzilla.redhat.com/show_bug.cgi?id=1370211 external
https://bugzilla.redhat.com/show_bug.cgi?id=1370216 external
https://bugzilla.redhat.com/show_bug.cgi?id=1370309 external
https://bugzilla.redhat.com/show_bug.cgi?id=1370310 external
https://bugzilla.redhat.com/show_bug.cgi?id=1370476 external
https://bugzilla.redhat.com/show_bug.cgi?id=1370478 external
https://bugzilla.redhat.com/show_bug.cgi?id=1370480 external
https://bugzilla.redhat.com/show_bug.cgi?id=1370481 external
https://bugzilla.redhat.com/show_bug.cgi?id=1370488 external
https://bugzilla.redhat.com/show_bug.cgi?id=1370568 external
https://bugzilla.redhat.com/show_bug.cgi?id=1370569 external
https://bugzilla.redhat.com/show_bug.cgi?id=1370574 external
https://bugzilla.redhat.com/show_bug.cgi?id=1370575 external
https://bugzilla.redhat.com/show_bug.cgi?id=1370586 external
https://bugzilla.redhat.com/show_bug.cgi?id=1371174 external
https://bugzilla.redhat.com/show_bug.cgi?id=1371267 external
https://bugzilla.redhat.com/show_bug.cgi?id=1371268 external
https://bugzilla.redhat.com/show_bug.cgi?id=1371269 external
https://bugzilla.redhat.com/show_bug.cgi?id=1371270 external
https://bugzilla.redhat.com/show_bug.cgi?id=1371272 external
https://bugzilla.redhat.com/show_bug.cgi?id=1371311 external
https://bugzilla.redhat.com/show_bug.cgi?id=1371640 external
https://bugzilla.redhat.com/show_bug.cgi?id=1371666 external
https://bugzilla.redhat.com/show_bug.cgi?id=1371668 external
https://bugzilla.redhat.com/show_bug.cgi?id=1371669 external
https://bugzilla.redhat.com/show_bug.cgi?id=1371670 external
https://bugzilla.redhat.com/show_bug.cgi?id=1371671 external
https://bugzilla.redhat.com/show_bug.cgi?id=1374377 external
https://bugzilla.redhat.com/show_bug.cgi?id=1374420 external
https://bugzilla.redhat.com/show_bug.cgi?id=1374423 external
https://bugzilla.redhat.com/show_bug.cgi?id=1374450 external
https://bugzilla.redhat.com/show_bug.cgi?id=1374695 external
https://bugzilla.redhat.com/show_bug.cgi?id=1375343 external
https://bugzilla.redhat.com/show_bug.cgi?id=1376010 external
https://bugzilla.redhat.com/show_bug.cgi?id=1376130 external
https://bugzilla.redhat.com/show_bug.cgi?id=1376132 external
https://bugzilla.redhat.com/show_bug.cgi?id=1376137 external
https://bugzilla.redhat.com/show_bug.cgi?id=1376138 external
https://bugzilla.redhat.com/show_bug.cgi?id=1376139 external
https://bugzilla.redhat.com/show_bug.cgi?id=1376140 external
https://bugzilla.redhat.com/show_bug.cgi?id=1376146 external
https://bugzilla.redhat.com/show_bug.cgi?id=1376147 external
https://bugzilla.redhat.com/show_bug.cgi?id=1376150 external
https://bugzilla.redhat.com/show_bug.cgi?id=1376151 external
https://bugzilla.redhat.com/show_bug.cgi?id=1376153 external
https://bugzilla.redhat.com/show_bug.cgi?id=1376154 external
https://bugzilla.redhat.com/show_bug.cgi?id=1376155 external
https://bugzilla.redhat.com/show_bug.cgi?id=1376157 external
https://bugzilla.redhat.com/show_bug.cgi?id=1376158 external
https://bugzilla.redhat.com/show_bug.cgi?id=1376159 external
https://bugzilla.redhat.com/show_bug.cgi?id=1376160 external
https://bugzilla.redhat.com/show_bug.cgi?id=1376161 external
https://bugzilla.redhat.com/show_bug.cgi?id=1376162 external
https://bugzilla.redhat.com/show_bug.cgi?id=1376163 external
https://bugzilla.redhat.com/show_bug.cgi?id=1376164 external
https://bugzilla.redhat.com/show_bug.cgi?id=1376165 external
https://bugzilla.redhat.com/show_bug.cgi?id=1376171 external
https://bugzilla.redhat.com/show_bug.cgi?id=1376172 external
https://bugzilla.redhat.com/show_bug.cgi?id=1376174 external
https://bugzilla.redhat.com/show_bug.cgi?id=1376175 external
https://bugzilla.redhat.com/show_bug.cgi?id=1376176 external
https://bugzilla.redhat.com/show_bug.cgi?id=1376177 external
https://bugzilla.redhat.com/show_bug.cgi?id=1376178 external
https://bugzilla.redhat.com/show_bug.cgi?id=1376513 external
https://bugzilla.redhat.com/show_bug.cgi?id=1376520 external
https://bugzilla.redhat.com/show_bug.cgi?id=1376528 external
https://bugzilla.redhat.com/show_bug.cgi?id=1376557 external
https://bugzilla.redhat.com/show_bug.cgi?id=1374696 external
https://bugzilla.redhat.com/show_bug.cgi?id=1376574 external
https://security.access.redhat.com/data/csaf/v2/a… self
https://access.redhat.com/security/cve/CVE-2016-7040 self
https://bugzilla.redhat.com/show_bug.cgi?id=1375089 external
https://www.cve.org/CVERecord?id=CVE-2016-7040 external
https://nvd.nist.gov/vuln/detail/CVE-2016-7040 external
Acknowledgments
Red Hat Tim Wade

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated cfme packages that fix bugs and add various enhancements\nare now available for Red Hat CloudForms 4.1.\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Red Hat CloudForms Management Engine delivers the insight, control, \nand automation needed to address the challenges of managing virtual\nenvironments. CloudForms Management Engine is built on Ruby on Rails, \na model-view-controller (MVC) framework for web application \ndevelopment. Action Pack implements the controller and the view \ncomponents.\n\n* An input validation flaw was found in the way CloudForms regular \nexpressions were passed to the expression engine via the JSON API and the \nweb-based UI. A user with the ability to view collections and filter them \ncould use this flaw to execute arbitrary shell commands on the host with \nthe privileges of the CloudForms process. (CVE-2016-7040)\n\nThis issue was discovered by Tim Wade (Red Hat).\n\nAdditional Changes:\n\nThis update fixes bugs and adds various enhancements.\nDocumentation for these changes is available in the Release Notes linked\nto in the References section.\n\nAll CFME users are advised to upgrade to these updated packages, which\ncorrect these issues and add these enhancements.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2016:1996",
        "url": "https://access.redhat.com/errata/RHSA-2016:1996"
      },
      {
        "category": "external",
        "summary": "1374815",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1374815"
      },
      {
        "category": "external",
        "summary": "1375089",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375089"
      },
      {
        "category": "external",
        "summary": "1375205",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375205"
      },
      {
        "category": "external",
        "summary": "1375311",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375311"
      },
      {
        "category": "external",
        "summary": "1375326",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375326"
      },
      {
        "category": "external",
        "summary": "1375330",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375330"
      },
      {
        "category": "external",
        "summary": "1376167",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376167"
      },
      {
        "category": "external",
        "summary": "1376168",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376168"
      },
      {
        "category": "external",
        "summary": "1376169",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376169"
      },
      {
        "category": "external",
        "summary": "1376170",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376170"
      },
      {
        "category": "external",
        "summary": "1337552",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337552"
      },
      {
        "category": "external",
        "summary": "1337577",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337577"
      },
      {
        "category": "external",
        "summary": "1376173",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376173"
      },
      {
        "category": "external",
        "summary": "1348649",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348649"
      },
      {
        "category": "external",
        "summary": "1349059",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1349059"
      },
      {
        "category": "external",
        "summary": "1349423",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1349423"
      },
      {
        "category": "external",
        "summary": "1351332",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1351332"
      },
      {
        "category": "external",
        "summary": "1352016",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1352016"
      },
      {
        "category": "external",
        "summary": "1353291",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1353291"
      },
      {
        "category": "external",
        "summary": "1354503",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1354503"
      },
      {
        "category": "external",
        "summary": "1357865",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1357865"
      },
      {
        "category": "external",
        "summary": "1358323",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358323"
      },
      {
        "category": "external",
        "summary": "1361175",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361175"
      },
      {
        "category": "external",
        "summary": "1361176",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361176"
      },
      {
        "category": "external",
        "summary": "1361178",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361178"
      },
      {
        "category": "external",
        "summary": "1361693",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361693"
      },
      {
        "category": "external",
        "summary": "1362227",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1362227"
      },
      {
        "category": "external",
        "summary": "1362627",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1362627"
      },
      {
        "category": "external",
        "summary": "1362631",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1362631"
      },
      {
        "category": "external",
        "summary": "1362634",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1362634"
      },
      {
        "category": "external",
        "summary": "1362704",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1362704"
      },
      {
        "category": "external",
        "summary": "1363753",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1363753"
      },
      {
        "category": "external",
        "summary": "1363754",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1363754"
      },
      {
        "category": "external",
        "summary": "1371979",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1371979"
      },
      {
        "category": "external",
        "summary": "1371980",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1371980"
      },
      {
        "category": "external",
        "summary": "1371981",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1371981"
      },
      {
        "category": "external",
        "summary": "1372413",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1372413"
      },
      {
        "category": "external",
        "summary": "1372775",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1372775"
      },
      {
        "category": "external",
        "summary": "1372801",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1372801"
      },
      {
        "category": "external",
        "summary": "1376141",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376141"
      },
      {
        "category": "external",
        "summary": "1376143",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376143"
      },
      {
        "category": "external",
        "summary": "1376144",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376144"
      },
      {
        "category": "external",
        "summary": "1377416",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377416"
      },
      {
        "category": "external",
        "summary": "1377420",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377420"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1343517",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343517"
      },
      {
        "category": "external",
        "summary": "1343717",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343717"
      },
      {
        "category": "external",
        "summary": "1343719",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343719"
      },
      {
        "category": "external",
        "summary": "1346953",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1346953"
      },
      {
        "category": "external",
        "summary": "1346989",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1346989"
      },
      {
        "category": "external",
        "summary": "1346990",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1346990"
      },
      {
        "category": "external",
        "summary": "1347278",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1347278"
      },
      {
        "category": "external",
        "summary": "1347330",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1347330"
      },
      {
        "category": "external",
        "summary": "1347692",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1347692"
      },
      {
        "category": "external",
        "summary": "1348631",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348631"
      },
      {
        "category": "external",
        "summary": "1348637",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348637"
      },
      {
        "category": "external",
        "summary": "1348644",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348644"
      },
      {
        "category": "external",
        "summary": "1348648",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348648"
      },
      {
        "category": "external",
        "summary": "1363891",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1363891"
      },
      {
        "category": "external",
        "summary": "1364222",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1364222"
      },
      {
        "category": "external",
        "summary": "1364501",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1364501"
      },
      {
        "category": "external",
        "summary": "1366358",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1366358"
      },
      {
        "category": "external",
        "summary": "1366596",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1366596"
      },
      {
        "category": "external",
        "summary": "1366597",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1366597"
      },
      {
        "category": "external",
        "summary": "1366598",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1366598"
      },
      {
        "category": "external",
        "summary": "1366599",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1366599"
      },
      {
        "category": "external",
        "summary": "1368165",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1368165"
      },
      {
        "category": "external",
        "summary": "1368167",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1368167"
      },
      {
        "category": "external",
        "summary": "1368168",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1368168"
      },
      {
        "category": "external",
        "summary": "1368170",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1368170"
      },
      {
        "category": "external",
        "summary": "1369583",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369583"
      },
      {
        "category": "external",
        "summary": "1370196",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1370196"
      },
      {
        "category": "external",
        "summary": "1370198",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1370198"
      },
      {
        "category": "external",
        "summary": "1370202",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1370202"
      },
      {
        "category": "external",
        "summary": "1370208",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1370208"
      },
      {
        "category": "external",
        "summary": "1370209",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1370209"
      },
      {
        "category": "external",
        "summary": "1370211",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1370211"
      },
      {
        "category": "external",
        "summary": "1370216",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1370216"
      },
      {
        "category": "external",
        "summary": "1370309",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1370309"
      },
      {
        "category": "external",
        "summary": "1370310",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1370310"
      },
      {
        "category": "external",
        "summary": "1370476",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1370476"
      },
      {
        "category": "external",
        "summary": "1370478",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1370478"
      },
      {
        "category": "external",
        "summary": "1370480",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1370480"
      },
      {
        "category": "external",
        "summary": "1370481",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1370481"
      },
      {
        "category": "external",
        "summary": "1370488",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1370488"
      },
      {
        "category": "external",
        "summary": "1370568",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1370568"
      },
      {
        "category": "external",
        "summary": "1370569",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1370569"
      },
      {
        "category": "external",
        "summary": "1370574",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1370574"
      },
      {
        "category": "external",
        "summary": "1370575",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1370575"
      },
      {
        "category": "external",
        "summary": "1370586",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1370586"
      },
      {
        "category": "external",
        "summary": "1371174",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1371174"
      },
      {
        "category": "external",
        "summary": "1371267",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1371267"
      },
      {
        "category": "external",
        "summary": "1371268",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1371268"
      },
      {
        "category": "external",
        "summary": "1371269",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1371269"
      },
      {
        "category": "external",
        "summary": "1371270",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1371270"
      },
      {
        "category": "external",
        "summary": "1371272",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1371272"
      },
      {
        "category": "external",
        "summary": "1371311",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1371311"
      },
      {
        "category": "external",
        "summary": "1371640",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1371640"
      },
      {
        "category": "external",
        "summary": "1371666",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1371666"
      },
      {
        "category": "external",
        "summary": "1371668",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1371668"
      },
      {
        "category": "external",
        "summary": "1371669",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1371669"
      },
      {
        "category": "external",
        "summary": "1371670",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1371670"
      },
      {
        "category": "external",
        "summary": "1371671",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1371671"
      },
      {
        "category": "external",
        "summary": "1374377",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1374377"
      },
      {
        "category": "external",
        "summary": "1374420",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1374420"
      },
      {
        "category": "external",
        "summary": "1374423",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1374423"
      },
      {
        "category": "external",
        "summary": "1374450",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1374450"
      },
      {
        "category": "external",
        "summary": "1374695",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1374695"
      },
      {
        "category": "external",
        "summary": "1375343",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375343"
      },
      {
        "category": "external",
        "summary": "1376010",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376010"
      },
      {
        "category": "external",
        "summary": "1376130",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376130"
      },
      {
        "category": "external",
        "summary": "1376132",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376132"
      },
      {
        "category": "external",
        "summary": "1376137",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376137"
      },
      {
        "category": "external",
        "summary": "1376138",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376138"
      },
      {
        "category": "external",
        "summary": "1376139",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376139"
      },
      {
        "category": "external",
        "summary": "1376140",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376140"
      },
      {
        "category": "external",
        "summary": "1376146",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376146"
      },
      {
        "category": "external",
        "summary": "1376147",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376147"
      },
      {
        "category": "external",
        "summary": "1376150",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376150"
      },
      {
        "category": "external",
        "summary": "1376151",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376151"
      },
      {
        "category": "external",
        "summary": "1376153",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376153"
      },
      {
        "category": "external",
        "summary": "1376154",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376154"
      },
      {
        "category": "external",
        "summary": "1376155",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376155"
      },
      {
        "category": "external",
        "summary": "1376157",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376157"
      },
      {
        "category": "external",
        "summary": "1376158",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376158"
      },
      {
        "category": "external",
        "summary": "1376159",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376159"
      },
      {
        "category": "external",
        "summary": "1376160",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376160"
      },
      {
        "category": "external",
        "summary": "1376161",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376161"
      },
      {
        "category": "external",
        "summary": "1376162",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376162"
      },
      {
        "category": "external",
        "summary": "1376163",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376163"
      },
      {
        "category": "external",
        "summary": "1376164",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376164"
      },
      {
        "category": "external",
        "summary": "1376165",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376165"
      },
      {
        "category": "external",
        "summary": "1376171",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376171"
      },
      {
        "category": "external",
        "summary": "1376172",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376172"
      },
      {
        "category": "external",
        "summary": "1376174",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376174"
      },
      {
        "category": "external",
        "summary": "1376175",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376175"
      },
      {
        "category": "external",
        "summary": "1376176",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376176"
      },
      {
        "category": "external",
        "summary": "1376177",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376177"
      },
      {
        "category": "external",
        "summary": "1376178",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376178"
      },
      {
        "category": "external",
        "summary": "1376513",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376513"
      },
      {
        "category": "external",
        "summary": "1376520",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376520"
      },
      {
        "category": "external",
        "summary": "1376528",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376528"
      },
      {
        "category": "external",
        "summary": "1376557",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376557"
      },
      {
        "category": "external",
        "summary": "1374696",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1374696"
      },
      {
        "category": "external",
        "summary": "1376574",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376574"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_1996.json"
      }
    ],
    "title": "Red Hat Security Advisory: CFME 4.1 bug fixes and enhancement update",
    "tracking": {
      "current_release_date": "2025-11-21T17:57:42+00:00",
      "generator": {
        "date": "2025-11-21T17:57:42+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.12"
        }
      },
      "id": "RHSA-2016:1996",
      "initial_release_date": "2016-10-04T14:26:13+00:00",
      "revision_history": [
        {
          "date": "2016-10-04T14:26:13+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2016-10-04T14:26:13+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-11-21T17:57:42+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "CloudForms Management Engine 5.6",
                "product": {
                  "name": "CloudForms Management Engine 5.6",
                  "product_id": "7Server-RH7-CFME-5.6",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:cloudforms_managementengine:5.6::el7"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat CloudForms"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "rh-ruby22-rubygem-thin-0:1.7.0-1.el7cf.x86_64",
                "product": {
                  "name": "rh-ruby22-rubygem-thin-0:1.7.0-1.el7cf.x86_64",
                  "product_id": "rh-ruby22-rubygem-thin-0:1.7.0-1.el7cf.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rh-ruby22-rubygem-thin@1.7.0-1.el7cf?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "rh-ruby22-rubygem-thin-debuginfo-0:1.7.0-1.el7cf.x86_64",
                "product": {
                  "name": "rh-ruby22-rubygem-thin-debuginfo-0:1.7.0-1.el7cf.x86_64",
                  "product_id": "rh-ruby22-rubygem-thin-debuginfo-0:1.7.0-1.el7cf.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rh-ruby22-rubygem-thin-debuginfo@1.7.0-1.el7cf?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "rh-ruby22-rubygem-nokogiri-debuginfo-0:1.6.8-1.el7cf.x86_64",
                "product": {
                  "name": "rh-ruby22-rubygem-nokogiri-debuginfo-0:1.6.8-1.el7cf.x86_64",
                  "product_id": "rh-ruby22-rubygem-nokogiri-debuginfo-0:1.6.8-1.el7cf.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rh-ruby22-rubygem-nokogiri-debuginfo@1.6.8-1.el7cf?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "rh-ruby22-rubygem-nokogiri-0:1.6.8-1.el7cf.x86_64",
                "product": {
                  "name": "rh-ruby22-rubygem-nokogiri-0:1.6.8-1.el7cf.x86_64",
                  "product_id": "rh-ruby22-rubygem-nokogiri-0:1.6.8-1.el7cf.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rh-ruby22-rubygem-nokogiri@1.6.8-1.el7cf?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "cfme-0:5.6.2.1-1.el7cf.x86_64",
                "product": {
                  "name": "cfme-0:5.6.2.1-1.el7cf.x86_64",
                  "product_id": "cfme-0:5.6.2.1-1.el7cf.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/cfme@5.6.2.1-1.el7cf?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "cfme-debuginfo-0:5.6.2.1-1.el7cf.x86_64",
                "product": {
                  "name": "cfme-debuginfo-0:5.6.2.1-1.el7cf.x86_64",
                  "product_id": "cfme-debuginfo-0:5.6.2.1-1.el7cf.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/cfme-debuginfo@5.6.2.1-1.el7cf?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "cfme-appliance-debuginfo-0:5.6.2.1-1.el7cf.x86_64",
                "product": {
                  "name": "cfme-appliance-debuginfo-0:5.6.2.1-1.el7cf.x86_64",
                  "product_id": "cfme-appliance-debuginfo-0:5.6.2.1-1.el7cf.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/cfme-appliance-debuginfo@5.6.2.1-1.el7cf?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "cfme-appliance-0:5.6.2.1-1.el7cf.x86_64",
                "product": {
                  "name": "cfme-appliance-0:5.6.2.1-1.el7cf.x86_64",
                  "product_id": "cfme-appliance-0:5.6.2.1-1.el7cf.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/cfme-appliance@5.6.2.1-1.el7cf?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "cfme-gemset-0:5.6.2.1-1.el7cf.x86_64",
                "product": {
                  "name": "cfme-gemset-0:5.6.2.1-1.el7cf.x86_64",
                  "product_id": "cfme-gemset-0:5.6.2.1-1.el7cf.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/cfme-gemset@5.6.2.1-1.el7cf?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "rh-ruby22-rubygem-thin-0:1.7.0-1.el7cf.src",
                "product": {
                  "name": "rh-ruby22-rubygem-thin-0:1.7.0-1.el7cf.src",
                  "product_id": "rh-ruby22-rubygem-thin-0:1.7.0-1.el7cf.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rh-ruby22-rubygem-thin@1.7.0-1.el7cf?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "rh-ruby22-rubygem-nokogiri-0:1.6.8-1.el7cf.src",
                "product": {
                  "name": "rh-ruby22-rubygem-nokogiri-0:1.6.8-1.el7cf.src",
                  "product_id": "rh-ruby22-rubygem-nokogiri-0:1.6.8-1.el7cf.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rh-ruby22-rubygem-nokogiri@1.6.8-1.el7cf?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "cfme-0:5.6.2.1-1.el7cf.src",
                "product": {
                  "name": "cfme-0:5.6.2.1-1.el7cf.src",
                  "product_id": "cfme-0:5.6.2.1-1.el7cf.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/cfme@5.6.2.1-1.el7cf?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "cfme-appliance-0:5.6.2.1-1.el7cf.src",
                "product": {
                  "name": "cfme-appliance-0:5.6.2.1-1.el7cf.src",
                  "product_id": "cfme-appliance-0:5.6.2.1-1.el7cf.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/cfme-appliance@5.6.2.1-1.el7cf?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "cfme-gemset-0:5.6.2.1-1.el7cf.src",
                "product": {
                  "name": "cfme-gemset-0:5.6.2.1-1.el7cf.src",
                  "product_id": "cfme-gemset-0:5.6.2.1-1.el7cf.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/cfme-gemset@5.6.2.1-1.el7cf?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "rh-ruby22-rubygem-pkg-config-0:1.1.7-1.el7cf.src",
                "product": {
                  "name": "rh-ruby22-rubygem-pkg-config-0:1.1.7-1.el7cf.src",
                  "product_id": "rh-ruby22-rubygem-pkg-config-0:1.1.7-1.el7cf.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rh-ruby22-rubygem-pkg-config@1.1.7-1.el7cf?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "rh-ruby22-rubygem-pkg-config-0:1.1.7-1.el7cf.noarch",
                "product": {
                  "name": "rh-ruby22-rubygem-pkg-config-0:1.1.7-1.el7cf.noarch",
                  "product_id": "rh-ruby22-rubygem-pkg-config-0:1.1.7-1.el7cf.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rh-ruby22-rubygem-pkg-config@1.1.7-1.el7cf?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "rh-ruby22-rubygem-pkg-config-doc-0:1.1.7-1.el7cf.noarch",
                "product": {
                  "name": "rh-ruby22-rubygem-pkg-config-doc-0:1.1.7-1.el7cf.noarch",
                  "product_id": "rh-ruby22-rubygem-pkg-config-doc-0:1.1.7-1.el7cf.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rh-ruby22-rubygem-pkg-config-doc@1.1.7-1.el7cf?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cfme-0:5.6.2.1-1.el7cf.src as a component of CloudForms Management Engine 5.6",
          "product_id": "7Server-RH7-CFME-5.6:cfme-0:5.6.2.1-1.el7cf.src"
        },
        "product_reference": "cfme-0:5.6.2.1-1.el7cf.src",
        "relates_to_product_reference": "7Server-RH7-CFME-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cfme-0:5.6.2.1-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.6",
          "product_id": "7Server-RH7-CFME-5.6:cfme-0:5.6.2.1-1.el7cf.x86_64"
        },
        "product_reference": "cfme-0:5.6.2.1-1.el7cf.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cfme-appliance-0:5.6.2.1-1.el7cf.src as a component of CloudForms Management Engine 5.6",
          "product_id": "7Server-RH7-CFME-5.6:cfme-appliance-0:5.6.2.1-1.el7cf.src"
        },
        "product_reference": "cfme-appliance-0:5.6.2.1-1.el7cf.src",
        "relates_to_product_reference": "7Server-RH7-CFME-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cfme-appliance-0:5.6.2.1-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.6",
          "product_id": "7Server-RH7-CFME-5.6:cfme-appliance-0:5.6.2.1-1.el7cf.x86_64"
        },
        "product_reference": "cfme-appliance-0:5.6.2.1-1.el7cf.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cfme-appliance-debuginfo-0:5.6.2.1-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.6",
          "product_id": "7Server-RH7-CFME-5.6:cfme-appliance-debuginfo-0:5.6.2.1-1.el7cf.x86_64"
        },
        "product_reference": "cfme-appliance-debuginfo-0:5.6.2.1-1.el7cf.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cfme-debuginfo-0:5.6.2.1-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.6",
          "product_id": "7Server-RH7-CFME-5.6:cfme-debuginfo-0:5.6.2.1-1.el7cf.x86_64"
        },
        "product_reference": "cfme-debuginfo-0:5.6.2.1-1.el7cf.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cfme-gemset-0:5.6.2.1-1.el7cf.src as a component of CloudForms Management Engine 5.6",
          "product_id": "7Server-RH7-CFME-5.6:cfme-gemset-0:5.6.2.1-1.el7cf.src"
        },
        "product_reference": "cfme-gemset-0:5.6.2.1-1.el7cf.src",
        "relates_to_product_reference": "7Server-RH7-CFME-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cfme-gemset-0:5.6.2.1-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.6",
          "product_id": "7Server-RH7-CFME-5.6:cfme-gemset-0:5.6.2.1-1.el7cf.x86_64"
        },
        "product_reference": "cfme-gemset-0:5.6.2.1-1.el7cf.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-ruby22-rubygem-nokogiri-0:1.6.8-1.el7cf.src as a component of CloudForms Management Engine 5.6",
          "product_id": "7Server-RH7-CFME-5.6:rh-ruby22-rubygem-nokogiri-0:1.6.8-1.el7cf.src"
        },
        "product_reference": "rh-ruby22-rubygem-nokogiri-0:1.6.8-1.el7cf.src",
        "relates_to_product_reference": "7Server-RH7-CFME-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-ruby22-rubygem-nokogiri-0:1.6.8-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.6",
          "product_id": "7Server-RH7-CFME-5.6:rh-ruby22-rubygem-nokogiri-0:1.6.8-1.el7cf.x86_64"
        },
        "product_reference": "rh-ruby22-rubygem-nokogiri-0:1.6.8-1.el7cf.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-ruby22-rubygem-nokogiri-debuginfo-0:1.6.8-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.6",
          "product_id": "7Server-RH7-CFME-5.6:rh-ruby22-rubygem-nokogiri-debuginfo-0:1.6.8-1.el7cf.x86_64"
        },
        "product_reference": "rh-ruby22-rubygem-nokogiri-debuginfo-0:1.6.8-1.el7cf.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-ruby22-rubygem-pkg-config-0:1.1.7-1.el7cf.noarch as a component of CloudForms Management Engine 5.6",
          "product_id": "7Server-RH7-CFME-5.6:rh-ruby22-rubygem-pkg-config-0:1.1.7-1.el7cf.noarch"
        },
        "product_reference": "rh-ruby22-rubygem-pkg-config-0:1.1.7-1.el7cf.noarch",
        "relates_to_product_reference": "7Server-RH7-CFME-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-ruby22-rubygem-pkg-config-0:1.1.7-1.el7cf.src as a component of CloudForms Management Engine 5.6",
          "product_id": "7Server-RH7-CFME-5.6:rh-ruby22-rubygem-pkg-config-0:1.1.7-1.el7cf.src"
        },
        "product_reference": "rh-ruby22-rubygem-pkg-config-0:1.1.7-1.el7cf.src",
        "relates_to_product_reference": "7Server-RH7-CFME-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-ruby22-rubygem-pkg-config-doc-0:1.1.7-1.el7cf.noarch as a component of CloudForms Management Engine 5.6",
          "product_id": "7Server-RH7-CFME-5.6:rh-ruby22-rubygem-pkg-config-doc-0:1.1.7-1.el7cf.noarch"
        },
        "product_reference": "rh-ruby22-rubygem-pkg-config-doc-0:1.1.7-1.el7cf.noarch",
        "relates_to_product_reference": "7Server-RH7-CFME-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-ruby22-rubygem-thin-0:1.7.0-1.el7cf.src as a component of CloudForms Management Engine 5.6",
          "product_id": "7Server-RH7-CFME-5.6:rh-ruby22-rubygem-thin-0:1.7.0-1.el7cf.src"
        },
        "product_reference": "rh-ruby22-rubygem-thin-0:1.7.0-1.el7cf.src",
        "relates_to_product_reference": "7Server-RH7-CFME-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-ruby22-rubygem-thin-0:1.7.0-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.6",
          "product_id": "7Server-RH7-CFME-5.6:rh-ruby22-rubygem-thin-0:1.7.0-1.el7cf.x86_64"
        },
        "product_reference": "rh-ruby22-rubygem-thin-0:1.7.0-1.el7cf.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-ruby22-rubygem-thin-debuginfo-0:1.7.0-1.el7cf.x86_64 as a component of CloudForms Management Engine 5.6",
          "product_id": "7Server-RH7-CFME-5.6:rh-ruby22-rubygem-thin-debuginfo-0:1.7.0-1.el7cf.x86_64"
        },
        "product_reference": "rh-ruby22-rubygem-thin-debuginfo-0:1.7.0-1.el7cf.x86_64",
        "relates_to_product_reference": "7Server-RH7-CFME-5.6"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Tim Wade"
          ],
          "organization": "Red Hat",
          "summary": "This issue was discovered by Red Hat."
        }
      ],
      "cve": "CVE-2016-7040",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2016-09-09T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1375089"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An input validation flaw was found in the way CloudForms regular expressions were passed to the expression engine via both the JSON API and the web based UI. A user with the ability to view collections and filter them could use this flaw to execute arbitrary shell commands on the host with the privileges of the CloudForms process.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "cfme: Incorrect sanitization in regular expression engine",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RH7-CFME-5.6:cfme-0:5.6.2.1-1.el7cf.src",
          "7Server-RH7-CFME-5.6:cfme-0:5.6.2.1-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.6:cfme-appliance-0:5.6.2.1-1.el7cf.src",
          "7Server-RH7-CFME-5.6:cfme-appliance-0:5.6.2.1-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.6:cfme-appliance-debuginfo-0:5.6.2.1-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.6:cfme-debuginfo-0:5.6.2.1-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.6:cfme-gemset-0:5.6.2.1-1.el7cf.src",
          "7Server-RH7-CFME-5.6:cfme-gemset-0:5.6.2.1-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.6:rh-ruby22-rubygem-nokogiri-0:1.6.8-1.el7cf.src",
          "7Server-RH7-CFME-5.6:rh-ruby22-rubygem-nokogiri-0:1.6.8-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.6:rh-ruby22-rubygem-nokogiri-debuginfo-0:1.6.8-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.6:rh-ruby22-rubygem-pkg-config-0:1.1.7-1.el7cf.noarch",
          "7Server-RH7-CFME-5.6:rh-ruby22-rubygem-pkg-config-0:1.1.7-1.el7cf.src",
          "7Server-RH7-CFME-5.6:rh-ruby22-rubygem-pkg-config-doc-0:1.1.7-1.el7cf.noarch",
          "7Server-RH7-CFME-5.6:rh-ruby22-rubygem-thin-0:1.7.0-1.el7cf.src",
          "7Server-RH7-CFME-5.6:rh-ruby22-rubygem-thin-0:1.7.0-1.el7cf.x86_64",
          "7Server-RH7-CFME-5.6:rh-ruby22-rubygem-thin-debuginfo-0:1.7.0-1.el7cf.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2016-7040"
        },
        {
          "category": "external",
          "summary": "RHBZ#1375089",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375089"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2016-7040",
          "url": "https://www.cve.org/CVERecord?id=CVE-2016-7040"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-7040",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-7040"
        }
      ],
      "release_date": "2016-10-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2016-10-04T14:26:13+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-RH7-CFME-5.6:cfme-0:5.6.2.1-1.el7cf.src",
            "7Server-RH7-CFME-5.6:cfme-0:5.6.2.1-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.6:cfme-appliance-0:5.6.2.1-1.el7cf.src",
            "7Server-RH7-CFME-5.6:cfme-appliance-0:5.6.2.1-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.6:cfme-appliance-debuginfo-0:5.6.2.1-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.6:cfme-debuginfo-0:5.6.2.1-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.6:cfme-gemset-0:5.6.2.1-1.el7cf.src",
            "7Server-RH7-CFME-5.6:cfme-gemset-0:5.6.2.1-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.6:rh-ruby22-rubygem-nokogiri-0:1.6.8-1.el7cf.src",
            "7Server-RH7-CFME-5.6:rh-ruby22-rubygem-nokogiri-0:1.6.8-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.6:rh-ruby22-rubygem-nokogiri-debuginfo-0:1.6.8-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.6:rh-ruby22-rubygem-pkg-config-0:1.1.7-1.el7cf.noarch",
            "7Server-RH7-CFME-5.6:rh-ruby22-rubygem-pkg-config-0:1.1.7-1.el7cf.src",
            "7Server-RH7-CFME-5.6:rh-ruby22-rubygem-pkg-config-doc-0:1.1.7-1.el7cf.noarch",
            "7Server-RH7-CFME-5.6:rh-ruby22-rubygem-thin-0:1.7.0-1.el7cf.src",
            "7Server-RH7-CFME-5.6:rh-ruby22-rubygem-thin-0:1.7.0-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.6:rh-ruby22-rubygem-thin-debuginfo-0:1.7.0-1.el7cf.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2016:1996"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.0,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "7Server-RH7-CFME-5.6:cfme-0:5.6.2.1-1.el7cf.src",
            "7Server-RH7-CFME-5.6:cfme-0:5.6.2.1-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.6:cfme-appliance-0:5.6.2.1-1.el7cf.src",
            "7Server-RH7-CFME-5.6:cfme-appliance-0:5.6.2.1-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.6:cfme-appliance-debuginfo-0:5.6.2.1-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.6:cfme-debuginfo-0:5.6.2.1-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.6:cfme-gemset-0:5.6.2.1-1.el7cf.src",
            "7Server-RH7-CFME-5.6:cfme-gemset-0:5.6.2.1-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.6:rh-ruby22-rubygem-nokogiri-0:1.6.8-1.el7cf.src",
            "7Server-RH7-CFME-5.6:rh-ruby22-rubygem-nokogiri-0:1.6.8-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.6:rh-ruby22-rubygem-nokogiri-debuginfo-0:1.6.8-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.6:rh-ruby22-rubygem-pkg-config-0:1.1.7-1.el7cf.noarch",
            "7Server-RH7-CFME-5.6:rh-ruby22-rubygem-pkg-config-0:1.1.7-1.el7cf.src",
            "7Server-RH7-CFME-5.6:rh-ruby22-rubygem-pkg-config-doc-0:1.1.7-1.el7cf.noarch",
            "7Server-RH7-CFME-5.6:rh-ruby22-rubygem-thin-0:1.7.0-1.el7cf.src",
            "7Server-RH7-CFME-5.6:rh-ruby22-rubygem-thin-0:1.7.0-1.el7cf.x86_64",
            "7Server-RH7-CFME-5.6:rh-ruby22-rubygem-thin-debuginfo-0:1.7.0-1.el7cf.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "cfme: Incorrect sanitization in regular expression engine"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…