exploit the possibilities

Red Hat Security Advisory 2019-1289-01

Red Hat Security Advisory 2019-1289-01
Posted May 29, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-1289-01 - Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller framework for web application development. Action Pack implements the controller and the view components. Issues addressed include denial of service and traversal vulnerabilities.

tags | advisory, web, denial of service, vulnerability, ruby
systems | linux, redhat
advisories | CVE-2019-5418, CVE-2019-5419
MD5 | 30656ea6510df80bada9cabbfa080ddd

Red Hat Security Advisory 2019-1289-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Important: CloudForms 4.6.9 security, bug fix and enhancement update
Advisory ID: RHSA-2019:1289-01
Product: Red Hat CloudForms
Advisory URL: https://access.redhat.com/errata/RHSA-2019:1289
Issue date: 2019-05-29
Cross references: RHSA-2019:0600
CVE Names: CVE-2019-5418 CVE-2019-5419
=====================================================================

1. Summary:

An update is now available for CloudForms Management Engine 5.9.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

CloudForms Management Engine 5.9 - x86_64

3. Description:

Red Hat CloudForms Management Engine delivers the insight, control, and
automation needed to address the challenges of managing virtual
environments. CloudForms Management Engine is built on Ruby on Rails, a
model-view-controller (MVC) framework for web application development.
Action Pack implements the controller and the view components.

Security Fix(es):

* rubygem-actionpack: render file directory traversal in Action View
(CVE-2019-5418)

* rubygem-actionpack: denial of service vulnerability in Action View
(CVE-2019-5419)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the References section.

Additional Changes:

This update fixes various bugs and adds enhancements. Documentation for
these changes is available from the Release Notes document linked to in the
References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

If the postgresql service is running, it will be automatically restarted
after installing this update. After installing the updated packages, the
httpd daemon will be restarted automatically.

5. Bugs fixed (https://bugzilla.redhat.com/):

1688871 - Unable to see dialog details passed to catalog after upgrade from 5.9.4 to 5.9.6
1689159 - CVE-2019-5418 rubygem-actionpack: render file directory traversal in Action View
1689160 - CVE-2019-5419 rubygem-actionpack: denial of service vulnerability in Action View
1695655 - [RFE] Metrics for memory usage of AWS instances needs to be collected from CloudWatch new Agent
1696363 - Different syntax by Service Request in Master region
1704340 - OpenStack Snapshot Image Doesn't Inherit the Same Cloud Tenant as the Instance

6. Package List:

CloudForms Management Engine 5.9:

Source:
cfme-5.9.9.3-1.el7cf.src.rpm
cfme-amazon-smartstate-5.9.9.3-1.el7cf.src.rpm
cfme-appliance-5.9.9.3-1.el7cf.src.rpm
cfme-gemset-5.9.9.3-1.el7cf.src.rpm

x86_64:
cfme-5.9.9.3-1.el7cf.x86_64.rpm
cfme-amazon-smartstate-5.9.9.3-1.el7cf.x86_64.rpm
cfme-appliance-5.9.9.3-1.el7cf.x86_64.rpm
cfme-appliance-common-5.9.9.3-1.el7cf.x86_64.rpm
cfme-appliance-debuginfo-5.9.9.3-1.el7cf.x86_64.rpm
cfme-appliance-tools-5.9.9.3-1.el7cf.x86_64.rpm
cfme-debuginfo-5.9.9.3-1.el7cf.x86_64.rpm
cfme-gemset-5.9.9.3-1.el7cf.x86_64.rpm
cfme-gemset-debuginfo-5.9.9.3-1.el7cf.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2019-5418
https://access.redhat.com/security/cve/CVE-2019-5419
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/documentation/en-us/red_hat_cloudforms/4.6/html/release_notes

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2019 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBXO5+INzjgjWX9erEAQh1SxAAi8mVRISvDeLCi+/Vw525NXKaV/1Clzgp
3Ir5Cwxqr6xOwH/4HEFAbhQOJfYiO6m/ewQ6nmZZB8LYjRS/x7J5sLDvi0iSFmCI
IyQ7IHMMiypxDwpj0two4S/MoxO93Y9xd32MUPsh/717sstzNgeEs/DPjsOxje4p
ne35r2KPZAuB2ckRgiFKEYdyj2vDIDQ8XEjJ9jRZZtmRSaYwNSxl5VhKpJM4mBSv
TXKtcQO2o2vxMOg7KkoPQsaKNEgiac95plawdV7hEDYhNvSwM68Bi4neaRxtHd1D
SIKYAmHtRZrl/fdiEFkIhri0qZuhNxwwCM19DWH9znAd2+bNLMDurwpRaKHHSa8J
TPkV17+IYfC4DxQ/5nDoQn3OWNi1j2YA6ExKRavBoQCN4l8fy6AkXAaEdiahIN1h
vfTVfJ6iu/43r6NqBjzRlCNR548uZe0XreB624vNFcx2A5oWsMIzRauVGCQcgWVH
zL4YYaWhH+60X7g4u69KMi6GcxVsdH9UGxPfHEjKhx7WD2/rdsmYQ9x5fU3ALbma
PPPziHR+u2WSShy8tQRhHT3XskrMMs71Yc+ltQEiDv6HlRWVvBL+UI2Xjj6TSBEW
6MfJ7J1E544MwMGOTCV5mWjKQ6WcbjsM6DARBUlVKODdXTLQxOJC3jFbVJzYo3XR
P934/jZH+YU=
=JpMe
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

June 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    1 Files
  • 2
    Jun 2nd
    2 Files
  • 3
    Jun 3rd
    19 Files
  • 4
    Jun 4th
    21 Files
  • 5
    Jun 5th
    15 Files
  • 6
    Jun 6th
    12 Files
  • 7
    Jun 7th
    11 Files
  • 8
    Jun 8th
    1 Files
  • 9
    Jun 9th
    1 Files
  • 10
    Jun 10th
    15 Files
  • 11
    Jun 11th
    15 Files
  • 12
    Jun 12th
    15 Files
  • 13
    Jun 13th
    8 Files
  • 14
    Jun 14th
    16 Files
  • 15
    Jun 15th
    2 Files
  • 16
    Jun 16th
    1 Files
  • 17
    Jun 17th
    18 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close