-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: CloudForms 4.6.9 security, bug fix and enhancement update Advisory ID: RHSA-2019:1289-01 Product: Red Hat CloudForms Advisory URL: https://access.redhat.com/errata/RHSA-2019:1289 Issue date: 2019-05-29 Cross references: RHSA-2019:0600 CVE Names: CVE-2019-5418 CVE-2019-5419 ===================================================================== 1. Summary: An update is now available for CloudForms Management Engine 5.9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: CloudForms Management Engine 5.9 - x86_64 3. Description: Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller (MVC) framework for web application development. Action Pack implements the controller and the view components. Security Fix(es): * rubygem-actionpack: render file directory traversal in Action View (CVE-2019-5418) * rubygem-actionpack: denial of service vulnerability in Action View (CVE-2019-5419) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: This update fixes various bugs and adds enhancements. Documentation for these changes is available from the Release Notes document linked to in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 If the postgresql service is running, it will be automatically restarted after installing this update. After installing the updated packages, the httpd daemon will be restarted automatically. 5. Bugs fixed (https://bugzilla.redhat.com/): 1688871 - Unable to see dialog details passed to catalog after upgrade from 5.9.4 to 5.9.6 1689159 - CVE-2019-5418 rubygem-actionpack: render file directory traversal in Action View 1689160 - CVE-2019-5419 rubygem-actionpack: denial of service vulnerability in Action View 1695655 - [RFE] Metrics for memory usage of AWS instances needs to be collected from CloudWatch new Agent 1696363 - Different syntax by Service Request in Master region 1704340 - OpenStack Snapshot Image Doesn't Inherit the Same Cloud Tenant as the Instance 6. Package List: CloudForms Management Engine 5.9: Source: cfme-5.9.9.3-1.el7cf.src.rpm cfme-amazon-smartstate-5.9.9.3-1.el7cf.src.rpm cfme-appliance-5.9.9.3-1.el7cf.src.rpm cfme-gemset-5.9.9.3-1.el7cf.src.rpm x86_64: cfme-5.9.9.3-1.el7cf.x86_64.rpm cfme-amazon-smartstate-5.9.9.3-1.el7cf.x86_64.rpm cfme-appliance-5.9.9.3-1.el7cf.x86_64.rpm cfme-appliance-common-5.9.9.3-1.el7cf.x86_64.rpm cfme-appliance-debuginfo-5.9.9.3-1.el7cf.x86_64.rpm cfme-appliance-tools-5.9.9.3-1.el7cf.x86_64.rpm cfme-debuginfo-5.9.9.3-1.el7cf.x86_64.rpm cfme-gemset-5.9.9.3-1.el7cf.x86_64.rpm cfme-gemset-debuginfo-5.9.9.3-1.el7cf.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2019-5418 https://access.redhat.com/security/cve/CVE-2019-5419 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/documentation/en-us/red_hat_cloudforms/4.6/html/release_notes 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2019 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXO5+INzjgjWX9erEAQh1SxAAi8mVRISvDeLCi+/Vw525NXKaV/1Clzgp 3Ir5Cwxqr6xOwH/4HEFAbhQOJfYiO6m/ewQ6nmZZB8LYjRS/x7J5sLDvi0iSFmCI IyQ7IHMMiypxDwpj0two4S/MoxO93Y9xd32MUPsh/717sstzNgeEs/DPjsOxje4p ne35r2KPZAuB2ckRgiFKEYdyj2vDIDQ8XEjJ9jRZZtmRSaYwNSxl5VhKpJM4mBSv TXKtcQO2o2vxMOg7KkoPQsaKNEgiac95plawdV7hEDYhNvSwM68Bi4neaRxtHd1D SIKYAmHtRZrl/fdiEFkIhri0qZuhNxwwCM19DWH9znAd2+bNLMDurwpRaKHHSa8J TPkV17+IYfC4DxQ/5nDoQn3OWNi1j2YA6ExKRavBoQCN4l8fy6AkXAaEdiahIN1h vfTVfJ6iu/43r6NqBjzRlCNR548uZe0XreB624vNFcx2A5oWsMIzRauVGCQcgWVH zL4YYaWhH+60X7g4u69KMi6GcxVsdH9UGxPfHEjKhx7WD2/rdsmYQ9x5fU3ALbma PPPziHR+u2WSShy8tQRhHT3XskrMMs71Yc+ltQEiDv6HlRWVvBL+UI2Xjj6TSBEW 6MfJ7J1E544MwMGOTCV5mWjKQ6WcbjsM6DARBUlVKODdXTLQxOJC3jFbVJzYo3XR P934/jZH+YU= =JpMe -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce