exploit the possibilities

Red Hat Security Advisory 2020-5554-01

Red Hat Security Advisory 2020-5554-01
Posted Dec 16, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-5554-01 - Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller framework for web application development. Action Pack implements the controller and the view components.

tags | advisory, web, ruby
systems | linux, redhat
advisories | CVE-2020-25716
MD5 | f80dc5ae648876bf496b8b9551dfff53

Red Hat Security Advisory 2020-5554-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Important: CloudForms 5.0.10 security, bug fix and enhancement update
Advisory ID: RHSA-2020:5554-01
Product: Red Hat CloudForms
Advisory URL: https://access.redhat.com/errata/RHSA-2020:5554
Issue date: 2020-12-15
Cross references: RHBA-2020:4967
CVE Names: CVE-2020-25716
====================================================================
1. Summary:

An update is now available for CloudForms Management Engine 5.11.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

CloudForms Management Engine 5.11 - noarch, x86_64

3. Description:

Red Hat CloudForms Management Engine delivers the insight, control, and
automation needed to address the challenges of managing virtual
environments. CloudForms Management Engine is built on Ruby on Rails, a
model-view-controller (MVC) framework for web application development.
Action Pack implements the controller and the view components.

Security Fix(es):

* cfme-gemset: CloudForms: Incomplete fix for CVE-2020-10783
(CVE-2020-25716)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Additional Changes:

This update fixes various bugs and adds enhancements. Documentation for
these changes is available from the Release Notes document linked to in the
References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

If the postgresql service is running, it will be automatically restarted
after installing this update. After installing the updated packages, the
httpd daemon will be restarted automatically.

5. Bugs fixed (https://bugzilla.redhat.com/):

1835226 - ansible-runner playbooks used in provisioning failing due to connectivity issues to SCM cannot recover on task retry
1886887 - Running service lacks one of the tags assigned to it during service order
1889302 - /etc/machine-id is a part of image
1893014 - Issue when using ansible-runner to run a playbook with an ssh_key generated on rhel8
1896439 - Azure VM C&U metrics capture logs shows error: undefined method `iso8601' for nil:NilClass
1898525 - CVE-2020-25716 Cloudforms: Incomplete fix for CVE-2020-10783
1901328 - V2V: Configuration of RHV 4.4.3 conversion host fails

6. Package List:

CloudForms Management Engine 5.11:

Source:
cfme-5.11.10.1-1.el8cf.src.rpm
cfme-amazon-smartstate-5.11.10.1-1.el8cf.src.rpm
cfme-appliance-5.11.10.1-1.el8cf.src.rpm
cfme-gemset-5.11.10.1-1.el8cf.src.rpm
v2v-conversion-host-1.16.2-6.el8ev.src.rpm

noarch:
v2v-conversion-host-ansible-1.16.2-6.el8ev.noarch.rpm

x86_64:
cfme-5.11.10.1-1.el8cf.x86_64.rpm
cfme-amazon-smartstate-5.11.10.1-1.el8cf.x86_64.rpm
cfme-appliance-5.11.10.1-1.el8cf.x86_64.rpm
cfme-appliance-common-5.11.10.1-1.el8cf.x86_64.rpm
cfme-appliance-tools-5.11.10.1-1.el8cf.x86_64.rpm
cfme-gemset-5.11.10.1-1.el8cf.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2020-25716
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/documentation/en-us/red_hat_cloudforms/5.0/html/release_notes

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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*ee
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

April 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    17 Files
  • 2
    Apr 2nd
    2 Files
  • 3
    Apr 3rd
    2 Files
  • 4
    Apr 4th
    0 Files
  • 5
    Apr 5th
    15 Files
  • 6
    Apr 6th
    15 Files
  • 7
    Apr 7th
    20 Files
  • 8
    Apr 8th
    16 Files
  • 9
    Apr 9th
    5 Files
  • 10
    Apr 10th
    0 Files
  • 11
    Apr 11th
    0 Files
  • 12
    Apr 12th
    4 Files
  • 13
    Apr 13th
    15 Files
  • 14
    Apr 14th
    27 Files
  • 15
    Apr 15th
    19 Files
  • 16
    Apr 16th
    7 Files
  • 17
    Apr 17th
    1 Files
  • 18
    Apr 18th
    1 Files
  • 19
    Apr 19th
    19 Files
  • 20
    Apr 20th
    18 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close