-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Important: CloudForms 5.0.10 security, bug fix and enhancement update Advisory ID: RHSA-2020:5554-01 Product: Red Hat CloudForms Advisory URL: https://access.redhat.com/errata/RHSA-2020:5554 Issue date: 2020-12-15 Cross references: RHBA-2020:4967 CVE Names: CVE-2020-25716 ==================================================================== 1. Summary: An update is now available for CloudForms Management Engine 5.11. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: CloudForms Management Engine 5.11 - noarch, x86_64 3. Description: Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller (MVC) framework for web application development. Action Pack implements the controller and the view components. Security Fix(es): * cfme-gemset: CloudForms: Incomplete fix for CVE-2020-10783 (CVE-2020-25716) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: This update fixes various bugs and adds enhancements. Documentation for these changes is available from the Release Notes document linked to in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 If the postgresql service is running, it will be automatically restarted after installing this update. After installing the updated packages, the httpd daemon will be restarted automatically. 5. Bugs fixed (https://bugzilla.redhat.com/): 1835226 - ansible-runner playbooks used in provisioning failing due to connectivity issues to SCM cannot recover on task retry 1886887 - Running service lacks one of the tags assigned to it during service order 1889302 - /etc/machine-id is a part of image 1893014 - Issue when using ansible-runner to run a playbook with an ssh_key generated on rhel8 1896439 - Azure VM C&U metrics capture logs shows error: undefined method `iso8601' for nil:NilClass 1898525 - CVE-2020-25716 Cloudforms: Incomplete fix for CVE-2020-10783 1901328 - V2V: Configuration of RHV 4.4.3 conversion host fails 6. Package List: CloudForms Management Engine 5.11: Source: cfme-5.11.10.1-1.el8cf.src.rpm cfme-amazon-smartstate-5.11.10.1-1.el8cf.src.rpm cfme-appliance-5.11.10.1-1.el8cf.src.rpm cfme-gemset-5.11.10.1-1.el8cf.src.rpm v2v-conversion-host-1.16.2-6.el8ev.src.rpm noarch: v2v-conversion-host-ansible-1.16.2-6.el8ev.noarch.rpm x86_64: cfme-5.11.10.1-1.el8cf.x86_64.rpm cfme-amazon-smartstate-5.11.10.1-1.el8cf.x86_64.rpm cfme-appliance-5.11.10.1-1.el8cf.x86_64.rpm cfme-appliance-common-5.11.10.1-1.el8cf.x86_64.rpm cfme-appliance-tools-5.11.10.1-1.el8cf.x86_64.rpm cfme-gemset-5.11.10.1-1.el8cf.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2020-25716 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/documentation/en-us/red_hat_cloudforms/5.0/html/release_notes 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2020 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIUAwUBX9koVtzjgjWX9erEAQgLSQ/2MEQ8qa02anLxdijfHm1c7wtGQFVNF6yw LlXCA8F0gyYeP0hYSPTemrgNUY0AZLJOVufsFtcxFLvn515v4elsH/yHf8zGHUhI Uvk3LmbJyFq85OJiSow38rjM8Ca50l9OC/WnhSbwfajrCeogu/kwsE0nGOb1iQVQ /ZgLctJm9ZWuuCmkXNPr00G80KGNDL7L4Hhdph9yHPJZkkocA2KzVymCQXrLKlhQ wD/FPIKSV7+5MLIpAkbhUQ9C6Fv0PBX2I5vQJwHYJs5zNM8KBm1myN1FoB2+BsY6 0jxeLTb47283a8pAfP2CvR+Oh9tD7D7AJt25z2lMzeqxSseN3tC9p69kwEQUpPuC b+qVNwMKrSer7jurkVTXmcMG30GeFEi4P8xUqVNCvU61G2UDOYJHptZzDkIjoe6r NjQGrPK68/PGOwXIlEvvIs9sg/NxC1BkV3GxC8pJ+/yAm2ZpJOziG+/qNc1QcOqD Rll1554poSAdp7XAgk1xGzLPqVJAyrhciWa1vulbqyMZR03HGXDxJ+KnDLEzns9x P47YsRG/6Jy8wL4+k5Jlb5zyrmCT7aWdJ8tzM5ewHYesjko/yANRCYWVJd2iyPgw JKFVWP84ai6FoAmlLXynzcX54dvOlWipidOlSM9SsI74ZX0X283tYjH0yr2EU0gl XqryEOOPrA=*ee -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce