—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Important: CloudForms 5.0.10 security, bug fix and enhancement update
Advisory ID: RHSA-2020:5554-01
Product: Red Hat CloudForms
Advisory URL: https://access.redhat.com/errata/RHSA-2020:5554
Issue date: 2020-12-15
Cross references: RHBA-2020:4967
CVE Names: CVE-2020-25716
=====================================================================
1. Summary:
An update is now available for CloudForms Management Engine 5.11.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
CloudForms Management Engine 5.11 – noarch, x86_64
3. Description:
Red Hat CloudForms Management Engine delivers the insight, control, and
automation needed to address the challenges of managing virtual
environments. CloudForms Management Engine is built on Ruby on Rails, a
model-view-controller (MVC) framework for web application development.
Action Pack implements the controller and the view components.
Security Fix(es):
* cfme-gemset: CloudForms: Incomplete fix for CVE-2020-10783
(CVE-2020-25716)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Additional Changes:
This update fixes various bugs and adds enhancements. Documentation for
these changes is available from the Release Notes document linked to in the
References section.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
If the postgresql service is running, it will be automatically restarted
after installing this update. After installing the updated packages, the
httpd daemon will be restarted automatically.
5. Bugs fixed (https://bugzilla.redhat.com/):
1835226 – ansible-runner playbooks used in provisioning failing due to connectivity issues to SCM cannot recover on task retry
1886887 – Running service lacks one of the tags assigned to it during service order
1889302 – /etc/machine-id is a part of image
1893014 – Issue when using ansible-runner to run a playbook with an ssh_key generated on rhel8
1896439 – Azure VM C&U metrics capture logs shows error: undefined method `iso8601′ for nil:NilClass
1898525 – CVE-2020-25716 Cloudforms: Incomplete fix for CVE-2020-10783
1901328 – V2V: Configuration of RHV 4.4.3 conversion host fails
6. Package List:
CloudForms Management Engine 5.11:
Source:
cfme-5.11.10.1-1.el8cf.src.rpm
cfme-amazon-smartstate-5.11.10.1-1.el8cf.src.rpm
cfme-appliance-5.11.10.1-1.el8cf.src.rpm
cfme-gemset-5.11.10.1-1.el8cf.src.rpm
v2v-conversion-host-1.16.2-6.el8ev.src.rpm
noarch:
v2v-conversion-host-ansible-1.16.2-6.el8ev.noarch.rpm
x86_64:
cfme-5.11.10.1-1.el8cf.x86_64.rpm
cfme-amazon-smartstate-5.11.10.1-1.el8cf.x86_64.rpm
cfme-appliance-5.11.10.1-1.el8cf.x86_64.rpm
cfme-appliance-common-5.11.10.1-1.el8cf.x86_64.rpm
cfme-appliance-tools-5.11.10.1-1.el8cf.x86_64.rpm
cfme-gemset-5.11.10.1-1.el8cf.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2020-25716
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/documentation/en-us/red_hat_cloudforms/5.0/html/release_notes
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2020 Red Hat, Inc.
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1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=2Aee
—–END PGP SIGNATURE—–
—
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce