what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Red Hat Security Advisory 2020-5554-01

Red Hat Security Advisory 2020-5554-01
Posted Dec 16, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-5554-01 - Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller framework for web application development. Action Pack implements the controller and the view components.

tags | advisory, web, ruby
systems | linux, redhat
advisories | CVE-2020-25716
SHA-256 | 72fb7d8159605d793b6364a140d58c4f6dab3bb0fb53bd87cd5693cc736d1520

Red Hat Security Advisory 2020-5554-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Important: CloudForms 5.0.10 security, bug fix and enhancement update
Advisory ID: RHSA-2020:5554-01
Product: Red Hat CloudForms
Advisory URL: https://access.redhat.com/errata/RHSA-2020:5554
Issue date: 2020-12-15
Cross references: RHBA-2020:4967
CVE Names: CVE-2020-25716
====================================================================
1. Summary:

An update is now available for CloudForms Management Engine 5.11.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

CloudForms Management Engine 5.11 - noarch, x86_64

3. Description:

Red Hat CloudForms Management Engine delivers the insight, control, and
automation needed to address the challenges of managing virtual
environments. CloudForms Management Engine is built on Ruby on Rails, a
model-view-controller (MVC) framework for web application development.
Action Pack implements the controller and the view components.

Security Fix(es):

* cfme-gemset: CloudForms: Incomplete fix for CVE-2020-10783
(CVE-2020-25716)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Additional Changes:

This update fixes various bugs and adds enhancements. Documentation for
these changes is available from the Release Notes document linked to in the
References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

If the postgresql service is running, it will be automatically restarted
after installing this update. After installing the updated packages, the
httpd daemon will be restarted automatically.

5. Bugs fixed (https://bugzilla.redhat.com/):

1835226 - ansible-runner playbooks used in provisioning failing due to connectivity issues to SCM cannot recover on task retry
1886887 - Running service lacks one of the tags assigned to it during service order
1889302 - /etc/machine-id is a part of image
1893014 - Issue when using ansible-runner to run a playbook with an ssh_key generated on rhel8
1896439 - Azure VM C&U metrics capture logs shows error: undefined method `iso8601' for nil:NilClass
1898525 - CVE-2020-25716 Cloudforms: Incomplete fix for CVE-2020-10783
1901328 - V2V: Configuration of RHV 4.4.3 conversion host fails

6. Package List:

CloudForms Management Engine 5.11:

Source:
cfme-5.11.10.1-1.el8cf.src.rpm
cfme-amazon-smartstate-5.11.10.1-1.el8cf.src.rpm
cfme-appliance-5.11.10.1-1.el8cf.src.rpm
cfme-gemset-5.11.10.1-1.el8cf.src.rpm
v2v-conversion-host-1.16.2-6.el8ev.src.rpm

noarch:
v2v-conversion-host-ansible-1.16.2-6.el8ev.noarch.rpm

x86_64:
cfme-5.11.10.1-1.el8cf.x86_64.rpm
cfme-amazon-smartstate-5.11.10.1-1.el8cf.x86_64.rpm
cfme-appliance-5.11.10.1-1.el8cf.x86_64.rpm
cfme-appliance-common-5.11.10.1-1.el8cf.x86_64.rpm
cfme-appliance-tools-5.11.10.1-1.el8cf.x86_64.rpm
cfme-gemset-5.11.10.1-1.el8cf.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2020-25716
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/documentation/en-us/red_hat_cloudforms/5.0/html/release_notes

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIUAwUBX9koVtzjgjWX9erEAQgLSQ/2MEQ8qa02anLxdijfHm1c7wtGQFVNF6yw
LlXCA8F0gyYeP0hYSPTemrgNUY0AZLJOVufsFtcxFLvn515v4elsH/yHf8zGHUhI
Uvk3LmbJyFq85OJiSow38rjM8Ca50l9OC/WnhSbwfajrCeogu/kwsE0nGOb1iQVQ
/ZgLctJm9ZWuuCmkXNPr00G80KGNDL7L4Hhdph9yHPJZkkocA2KzVymCQXrLKlhQ
wD/FPIKSV7+5MLIpAkbhUQ9C6Fv0PBX2I5vQJwHYJs5zNM8KBm1myN1FoB2+BsY6
0jxeLTb47283a8pAfP2CvR+Oh9tD7D7AJt25z2lMzeqxSseN3tC9p69kwEQUpPuC
b+qVNwMKrSer7jurkVTXmcMG30GeFEi4P8xUqVNCvU61G2UDOYJHptZzDkIjoe6r
NjQGrPK68/PGOwXIlEvvIs9sg/NxC1BkV3GxC8pJ+/yAm2ZpJOziG+/qNc1QcOqD
Rll1554poSAdp7XAgk1xGzLPqVJAyrhciWa1vulbqyMZR03HGXDxJ+KnDLEzns9x
P47YsRG/6Jy8wL4+k5Jlb5zyrmCT7aWdJ8tzM5ewHYesjko/yANRCYWVJd2iyPgw
JKFVWP84ai6FoAmlLXynzcX54dvOlWipidOlSM9SsI74ZX0X283tYjH0yr2EU0gl
XqryEOOPrA=*ee
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    34 Files
  • 18
    Jul 18th
    6 Files
  • 19
    Jul 19th
    34 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    19 Files
  • 23
    Jul 23rd
    17 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close