exploit the possibilities

Red Hat Security Advisory 2019-1289-01

Red Hat Security Advisory 2019-1289-01
Posted May 29, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-1289-01 - Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller framework for web application development. Action Pack implements the controller and the view components. Issues addressed include denial of service and traversal vulnerabilities.

tags | advisory, web, denial of service, vulnerability, ruby
systems | linux, redhat
advisories | CVE-2019-5418, CVE-2019-5419
MD5 | 30656ea6510df80bada9cabbfa080ddd

Red Hat Security Advisory 2019-1289-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Important: CloudForms 4.6.9 security, bug fix and enhancement update
Advisory ID: RHSA-2019:1289-01
Product: Red Hat CloudForms
Advisory URL: https://access.redhat.com/errata/RHSA-2019:1289
Issue date: 2019-05-29
Cross references: RHSA-2019:0600
CVE Names: CVE-2019-5418 CVE-2019-5419
=====================================================================

1. Summary:

An update is now available for CloudForms Management Engine 5.9.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

CloudForms Management Engine 5.9 - x86_64

3. Description:

Red Hat CloudForms Management Engine delivers the insight, control, and
automation needed to address the challenges of managing virtual
environments. CloudForms Management Engine is built on Ruby on Rails, a
model-view-controller (MVC) framework for web application development.
Action Pack implements the controller and the view components.

Security Fix(es):

* rubygem-actionpack: render file directory traversal in Action View
(CVE-2019-5418)

* rubygem-actionpack: denial of service vulnerability in Action View
(CVE-2019-5419)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the References section.

Additional Changes:

This update fixes various bugs and adds enhancements. Documentation for
these changes is available from the Release Notes document linked to in the
References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

If the postgresql service is running, it will be automatically restarted
after installing this update. After installing the updated packages, the
httpd daemon will be restarted automatically.

5. Bugs fixed (https://bugzilla.redhat.com/):

1688871 - Unable to see dialog details passed to catalog after upgrade from 5.9.4 to 5.9.6
1689159 - CVE-2019-5418 rubygem-actionpack: render file directory traversal in Action View
1689160 - CVE-2019-5419 rubygem-actionpack: denial of service vulnerability in Action View
1695655 - [RFE] Metrics for memory usage of AWS instances needs to be collected from CloudWatch new Agent
1696363 - Different syntax by Service Request in Master region
1704340 - OpenStack Snapshot Image Doesn't Inherit the Same Cloud Tenant as the Instance

6. Package List:

CloudForms Management Engine 5.9:

Source:
cfme-5.9.9.3-1.el7cf.src.rpm
cfme-amazon-smartstate-5.9.9.3-1.el7cf.src.rpm
cfme-appliance-5.9.9.3-1.el7cf.src.rpm
cfme-gemset-5.9.9.3-1.el7cf.src.rpm

x86_64:
cfme-5.9.9.3-1.el7cf.x86_64.rpm
cfme-amazon-smartstate-5.9.9.3-1.el7cf.x86_64.rpm
cfme-appliance-5.9.9.3-1.el7cf.x86_64.rpm
cfme-appliance-common-5.9.9.3-1.el7cf.x86_64.rpm
cfme-appliance-debuginfo-5.9.9.3-1.el7cf.x86_64.rpm
cfme-appliance-tools-5.9.9.3-1.el7cf.x86_64.rpm
cfme-debuginfo-5.9.9.3-1.el7cf.x86_64.rpm
cfme-gemset-5.9.9.3-1.el7cf.x86_64.rpm
cfme-gemset-debuginfo-5.9.9.3-1.el7cf.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2019-5418
https://access.redhat.com/security/cve/CVE-2019-5419
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/documentation/en-us/red_hat_cloudforms/4.6/html/release_notes

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2019 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBXO5+INzjgjWX9erEAQh1SxAAi8mVRISvDeLCi+/Vw525NXKaV/1Clzgp
3Ir5Cwxqr6xOwH/4HEFAbhQOJfYiO6m/ewQ6nmZZB8LYjRS/x7J5sLDvi0iSFmCI
IyQ7IHMMiypxDwpj0two4S/MoxO93Y9xd32MUPsh/717sstzNgeEs/DPjsOxje4p
ne35r2KPZAuB2ckRgiFKEYdyj2vDIDQ8XEjJ9jRZZtmRSaYwNSxl5VhKpJM4mBSv
TXKtcQO2o2vxMOg7KkoPQsaKNEgiac95plawdV7hEDYhNvSwM68Bi4neaRxtHd1D
SIKYAmHtRZrl/fdiEFkIhri0qZuhNxwwCM19DWH9znAd2+bNLMDurwpRaKHHSa8J
TPkV17+IYfC4DxQ/5nDoQn3OWNi1j2YA6ExKRavBoQCN4l8fy6AkXAaEdiahIN1h
vfTVfJ6iu/43r6NqBjzRlCNR548uZe0XreB624vNFcx2A5oWsMIzRauVGCQcgWVH
zL4YYaWhH+60X7g4u69KMi6GcxVsdH9UGxPfHEjKhx7WD2/rdsmYQ9x5fU3ALbma
PPPziHR+u2WSShy8tQRhHT3XskrMMs71Yc+ltQEiDv6HlRWVvBL+UI2Xjj6TSBEW
6MfJ7J1E544MwMGOTCV5mWjKQ6WcbjsM6DARBUlVKODdXTLQxOJC3jFbVJzYo3XR
P934/jZH+YU=
=JpMe
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

November 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    28 Files
  • 2
    Nov 2nd
    1 Files
  • 3
    Nov 3rd
    1 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    19 Files
  • 6
    Nov 6th
    65 Files
  • 7
    Nov 7th
    22 Files
  • 8
    Nov 8th
    18 Files
  • 9
    Nov 9th
    1 Files
  • 10
    Nov 10th
    1 Files
  • 11
    Nov 11th
    11 Files
  • 12
    Nov 12th
    65 Files
  • 13
    Nov 13th
    27 Files
  • 14
    Nov 14th
    22 Files
  • 15
    Nov 15th
    9 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close