You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa Red Hat Mobile Application Platform

Sigurnosni nedostaci programskog paketa Red Hat Mobile Application Platform

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

=====================================================================
Red Hat Security Advisory

Synopsis: Moderate: Red Hat Mobile Application Platform 4.6.0 release – RPMs
Advisory ID: RHSA-2018:1263-01
Product: Red Hat Mobile Application Platform
Advisory URL: https://access.redhat.com/errata/RHSA-2018:1263
Issue date: 2018-04-30
CVE Names: CVE-2017-15010 CVE-2018-3728
=====================================================================

1. Summary:

Red Hat Mobile Application Platform 4.6.0 release – RPMs

2. Relevant releases/architectures:

Red Hat Mobile Application Platform 4.6 – noarch, x86_64

3. Description:

Red Hat Mobile Application Platform (RHMAP) 4.6 is delivered as a set of
container images.

In addition to the images, several components are delivered as RPMs:

* OpenShift templates used to deploy an RHMAP Core and MBaaS

* The fh-system-dump-tool allows you to analyze all the projects running in
an OpenShift cluster and reports any problems discovered. For more
information, see the Operations Guide.

The following RPMs are included in the RHMAP container images, and are
provided here only for completeness:

* The Nagios server, which is used to monitor the status of RHMAP
components, is installed inside the Nagios container image.

This release serves as an update for Red Hat Mobile Application Platform
4.5.6. It includes bug fixes and enhancements. Refer to the Red Hat Mobile
Application Platform 4.6.0 Release Notes for information about the most
significant bug fixes and enhancements included in this release.

Nagios is a program that monitors hosts and services on your network, and
has the ability to send email or page alerts when a problem arises or is
resolved.

Security Fix(es):

* nodejs-tough-cookie: Regular expression denial of service
(CVE-2017-15010)

* hoek: Prototype pollution in utilities function (CVE-2018-3728)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1493989 – CVE-2017-15010 nodejs-tough-cookie: Regular expression denial of service
1545893 – CVE-2018-3728 hoek: Prototype pollution in utilities function

6. JIRA issues fixed (https://issues.jboss.org/):

RHMAP-19902 – Create productized release of RHMAP 4.6 for use by both self-managed and hosted offerings

7. Package List:

Red Hat Mobile Application Platform 4.6:

Source:
fh-system-dump-tool-1.0.0-5.el7.src.rpm
fping-3.10-4.el7map.src.rpm
nagios-4.0.8-8.el7map.src.rpm
nagios-plugins-2.0.3-3.el7map.src.rpm
perl-Crypt-CBC-2.33-2.el7map.src.rpm
perl-Crypt-DES-2.05-20.el7map.src.rpm
perl-Net-SNMP-6.0.1-7.el7map.src.rpm
phantomjs-1.9.7-3.el7map.src.rpm
python-meld3-0.6.10-1.el7map.src.rpm
qstat-2.11-13.20080912svn311.el7map.src.rpm
radiusclient-ng-0.5.6-9.el7map.src.rpm
redis-2.8.21-2.el7map.src.rpm
rhmap-fh-openshift-templates-4.6.0-5.el7.src.rpm
rhmap-mod_authnz_external-3.3.1-7.el7map.src.rpm
sendEmail-1.56-2.el7.src.rpm
ssmtp-2.64-14.el7map.src.rpm
supervisor-3.1.3-3.el7map.src.rpm

noarch:
perl-Crypt-CBC-2.33-2.el7map.noarch.rpm
perl-Net-SNMP-6.0.1-7.el7map.noarch.rpm
rhmap-fh-openshift-templates-4.6.0-5.el7.noarch.rpm
sendEmail-1.56-2.el7.noarch.rpm
supervisor-3.1.3-3.el7map.noarch.rpm

x86_64:
fh-system-dump-tool-1.0.0-5.el7.x86_64.rpm
fping-3.10-4.el7map.x86_64.rpm
fping-debuginfo-3.10-4.el7map.x86_64.rpm
nagios-4.0.8-8.el7map.x86_64.rpm
nagios-common-4.0.8-8.el7map.x86_64.rpm
nagios-debuginfo-4.0.8-8.el7map.x86_64.rpm
nagios-devel-4.0.8-8.el7map.x86_64.rpm
nagios-plugins-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-all-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-apt-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-breeze-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-by_ssh-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-cluster-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-dbi-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-debuginfo-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-dhcp-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-dig-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-disk-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-disk_smb-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-dns-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-dummy-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-file_age-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-flexlm-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-fping-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-game-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-hpjd-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-http-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-icmp-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-ide_smart-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-ifoperstatus-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-ifstatus-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-ircd-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-ldap-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-load-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-log-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-mailq-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-mrtg-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-mrtgtraf-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-mysql-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-nagios-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-nt-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-ntp-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-ntp-perl-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-nwstat-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-oracle-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-overcr-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-perl-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-pgsql-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-ping-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-procs-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-radius-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-real-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-rpc-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-sensors-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-smtp-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-snmp-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-ssh-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-swap-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-tcp-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-time-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-ups-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-uptime-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-users-2.0.3-3.el7map.x86_64.rpm
nagios-plugins-wave-2.0.3-3.el7map.x86_64.rpm
perl-Crypt-DES-2.05-20.el7map.x86_64.rpm
perl-Crypt-DES-debuginfo-2.05-20.el7map.x86_64.rpm
phantomjs-1.9.7-3.el7map.x86_64.rpm
phantomjs-debuginfo-1.9.7-3.el7map.x86_64.rpm
python-meld3-0.6.10-1.el7map.x86_64.rpm
python-meld3-debuginfo-0.6.10-1.el7map.x86_64.rpm
qstat-2.11-13.20080912svn311.el7map.x86_64.rpm
qstat-debuginfo-2.11-13.20080912svn311.el7map.x86_64.rpm
radiusclient-ng-0.5.6-9.el7map.x86_64.rpm
radiusclient-ng-debuginfo-0.5.6-9.el7map.x86_64.rpm
radiusclient-ng-devel-0.5.6-9.el7map.x86_64.rpm
radiusclient-ng-utils-0.5.6-9.el7map.x86_64.rpm
redis-2.8.21-2.el7map.x86_64.rpm
redis-debuginfo-2.8.21-2.el7map.x86_64.rpm
rhmap-mod_authnz_external-3.3.1-7.el7map.x86_64.rpm
rhmap-mod_authnz_external-debuginfo-3.3.1-7.el7map.x86_64.rpm
ssmtp-2.64-14.el7map.x86_64.rpm
ssmtp-debuginfo-2.64-14.el7map.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

8. References:

https://access.redhat.com/security/cve/CVE-2017-15010
https://access.redhat.com/security/cve/CVE-2018-3728
https://access.redhat.com/security/updates/classification/#moderate

9. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2018 Red Hat, Inc.
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1

iD8DBQFa52N+XlSAg2UNWIIRAqygAJ9noJhJ8e0rxjoKDSVQoRQK5j14JwCfVEhm
AELsmyx/WkgIUnMZLdpdKjg=
=0gN9
—–END PGP SIGNATURE—–


RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

=====================================================================
Red Hat Security Advisory

Synopsis: Moderate: Red Hat Mobile Application Platform 4.6.0 Release – Container Images
Advisory ID: RHSA-2018:1264-01
Product: Red Hat Mobile Application Platform
Advisory URL: https://access.redhat.com/errata/RHSA-2018:1264
Issue date: 2018-04-30
CVE Names: CVE-2017-15010 CVE-2018-3728
=====================================================================

1. Summary:

Red Hat Mobile Application Platform 4.6.0 Release – Container Images

2. Description:

Red Hat Mobile Application Platform (RHMAP) 4.6.0 consists of three main
components:

* Core – development and management of apps occurs in the RHMAP Core, which
can be installed either in an on-premise installation of OpenShift
Container Platform 3.x.

* MBaaS – Application data, runtimes, and integrations are deployed to the
RHMAP MBaaS installed on OpenShift Container Platform 3.x.

* Build Farm – deployed separately from the Core and the MBaaS, the Build
Farm is shared between all instances of RHMAP. Third-party Linux, Windows,
and Apple server hosting providers are used to support building client app
binaries for all platforms.

The Core and MBaaS in RHMAP 4.6 are built on top of OpenShift Container
Platform 3.x, Kubernetes, and Red Hat Software Collections. The Core and
MBaaS both consist of several components, each running in its own
container. Similarly, every cloud app deployed to the MBaaS runs in a
container. Those containers are deployed and orchestrated by Kubernetes.

This release includes the option of provisioning a self-managed Build Farm
on your infrastructure, to build Client Apps without relying on hosted
Build Farm. For prerequisites and installation instructions, see the
Installing RHMAP guide.

For this RHMAP release, the container images required to run the Core and
MBaaS inside OpenShift Container Platform 3.x are:

rhmap46/fh-aaa:1.1.3-4
rhmap46/fh-appstore:2.1.2-3
rhmap46/fh-mbaas:6.0.3-2
rhmap46/fh-messaging:3.2.0-4
rhmap46/fh-metrics:3.2.0-5
rhmap46/fh-ngui:5.19.3-1
rhmap46/fh-scm:1.1.4-2
rhmap46/fh-statsd:2.1.3-4
rhmap46/fh-supercore:5.0.10-2
rhmap46/fh-sdks:1.0.0-36
rhmap46/gitlab-shell:2.1.2-16
rhmap46/httpd:2.4-47
rhmap46/memcached:1.4.15-32
rhmap46/millicore:7.55.0-4
rhmap46/mongodb:3.2-36
rhmap46/mysql:5.5-28
rhmap46/nagios:4.0.8-58
rhmap46/redis:2.8.21-40
rhmap46/ups-eap:1.1.4-35
rhmap46/wildcard-proxy:1.0.0-17
rhmap46/installer:1.0.0-42

This release serves as an update for Red Hat Mobile Application Platform
4.5.6. It includes bug fixes and enhancements. Refer to the Red Hat Mobile
Application Platform 4.6.0 Release Notes for information about the most
significant bug fixes and enhancements included in this release.

Security Fix(es):

* nodejs-tough-cookie: Regular expression denial of service
(CVE-2017-15010)

* hoek: Prototype pollution in utilities function (CVE-2018-3728)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

3. Solution:

The container images provided by this update can be downloaded from the Red
Hat Container Registry at registry.access.redhat.com using the docker pull
command. Dockerfiles and scripts should be amended either to refer to these
new images specifically, or to the latest images generally.

4. Bugs fixed (https://bugzilla.redhat.com/):

1493989 – CVE-2017-15010 nodejs-tough-cookie: Regular expression denial of service
1545893 – CVE-2018-3728 hoek: Prototype pollution in utilities function

5. JIRA issues fixed (https://issues.jboss.org/):

RHMAP-19902 – Create productized release of RHMAP 4.6 for use by both self-managed and hosted offerings

6. References:

https://access.redhat.com/security/cve/CVE-2017-15010
https://access.redhat.com/security/cve/CVE-2018-3728
https://access.redhat.com/security/updates/classification/#moderate

7. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2018 Red Hat, Inc.
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1

iD8DBQFa6TlgXlSAg2UNWIIRAiQ2AJ9ywqVirL+qUp2gDOD51S3V1cg47gCfS8WI
NsY97FLFdAhF7MjTRhwdHHg=
=8GTn
—–END PGP SIGNATURE—–


RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

Top
More in Preporuke
Sigurnosni nedostaci programskog paketa ghostscript

Otkriveni su sigurnosni nedostaci u programskom paketu ghostscript za operacijski sustav Ubuntu. Otkriveni nedostaci potencijalnim napadačima omogućuju izazivanje DoS stanja....

Close