—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Moderate: ovirt-web-ui security and bug fix update
Advisory ID: RHSA-2019:3024-01
Product: Red Hat Virtualization
Advisory URL: https://access.redhat.com/errata/RHSA-2019:3024
Issue date: 2019-10-10
CVE Names: CVE-2019-8331 CVE-2019-10744 CVE-2019-11358
=====================================================================
1. Summary:
An update for ovirt-web-ui is now available for Red Hat Virtualization
Engine 4.3.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
2. Relevant releases/architectures:
RHV-M 4.3 – noarch
3. Description:
The ovirt-web-ui package provides the web interface for Red Hat
Virtualization.
Security Fix(es):
* nodejs-lodash: prototype pollution in defaultsDeep function leading to
modifying properties (CVE-2019-10744)
* bootstrap: XSS in the tooltip or popover data-template attribute
(CVE-2019-8331)
* js-jquery: prototype pollution in object’s prototype leading to denial of
service or remote code execution or property injection (CVE-2019-11358)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Bug Fix(es):
* Known moderate severity security vulnerability detected by GitHub on
ovirt-web-ui components (BZ#1694032)
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/2974891
5. Bugs fixed (https://bugzilla.redhat.com/):
1686454 – CVE-2019-8331 bootstrap: XSS in the tooltip or popover data-template attribute
1701972 – CVE-2019-11358 js-jquery: prototype pollution in object’s prototype leading to denial of service or remote code execution or property injection
1739497 – CVE-2019-10744 nodejs-lodash: prototype pollution in defaultsDeep function leading to modifying properties
6. Package List:
RHV-M 4.3:
Source:
ovirt-web-ui-1.6.0-1.el7ev.src.rpm
noarch:
ovirt-web-ui-1.6.0-1.el7ev.noarch.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2019-8331
https://access.redhat.com/security/cve/CVE-2019-10744
https://access.redhat.com/security/cve/CVE-2019-11358
https://access.redhat.com/security/updates/classification/#moderate
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2019 Red Hat, Inc.
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1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=vdE2
—–END PGP SIGNATURE—–
—
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce