-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.3809
                 ovirt-web-ui security and bug fix update
                              11 October 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Red Hat Virtualization
Publisher:         Red Hat
Operating System:  Red Hat
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated      
                   Denial of Service               -- Remote/Unauthenticated      
                   Cross-site Scripting            -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-11358 CVE-2019-10744 CVE-2019-8331

Reference:         ESB-2019.3376
                   ESB-2019.2074

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2019:3024

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: ovirt-web-ui security and bug fix update
Advisory ID:       RHSA-2019:3024-01
Product:           Red Hat Virtualization
Advisory URL:      https://access.redhat.com/errata/RHSA-2019:3024
Issue date:        2019-10-10
CVE Names:         CVE-2019-8331 CVE-2019-10744 CVE-2019-11358 
=====================================================================

1. Summary:

An update for ovirt-web-ui is now available for Red Hat Virtualization
Engine 4.3.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

RHV-M 4.3 - noarch

3. Description:

The ovirt-web-ui package provides the web interface for Red Hat
Virtualization.

Security Fix(es):

* nodejs-lodash: prototype pollution in defaultsDeep function leading to
modifying properties (CVE-2019-10744)

* bootstrap: XSS in the tooltip or popover data-template attribute
(CVE-2019-8331)

* js-jquery: prototype pollution in object's prototype leading to denial of
service or remote code execution or property injection (CVE-2019-11358)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Bug Fix(es):

* Known moderate severity security vulnerability detected by GitHub on
ovirt-web-ui components (BZ#1694032)

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/2974891

5. Bugs fixed (https://bugzilla.redhat.com/):

1686454 - CVE-2019-8331 bootstrap: XSS in the tooltip or popover data-template attribute
1701972 - CVE-2019-11358 js-jquery: prototype pollution in object's prototype leading to denial of service or remote code execution or property injection
1739497 - CVE-2019-10744 nodejs-lodash: prototype pollution in defaultsDeep function leading to modifying properties

6. Package List:

RHV-M 4.3:

Source:
ovirt-web-ui-1.6.0-1.el7ev.src.rpm

noarch:
ovirt-web-ui-1.6.0-1.el7ev.noarch.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2019-8331
https://access.redhat.com/security/cve/CVE-2019-10744
https://access.redhat.com/security/cve/CVE-2019-11358
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2019 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=vdE2
- -----END PGP SIGNATURE-----

- --
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBXZ/4vmaOgq3Tt24GAQgMjw/+LqxAYyT3zlFuFCt3CwkpYeS56D10qHow
Yx/WagwhCKZF/RmKJbLt7I3yHGW9gsvNIRXfe+VKqMdGFvlZcnJ176lN0tpVMTPP
kC+KinIF1mppwKKwQIJ/WxxIgpBjWHxfDRdUQuTsJSX8Zm/M9mJBYTu2SvY1Q9Jb
Lo/6vEIdBuCGpJEnd6I/kFNhPq3scBxzO+eU2c5CtxJMyu2IaoQR/1yvo7yuNi9K
tz3o8+bq1zLJBFNcwwN5sWdosf7l0gZdtxMdLvm0UdQ2YX0ii+he7qObkzEvP/f+
WA9PLhAspFqgbR2ZMTVWcxZ/a7NRWz5TsYZUyxMdXeyrfDKEYAIlj1dPSJqSFnN3
KsYLGaNks3naUm/V6AcggkpKfue5VZvlGLA/i5CDF/kSy2KgGA5Rz8kkU7qRxBaL
spjeLE1gKLV0XaJcuPZtb+YP3x7ekYh5nQsKInQ82Rcs7cJXiPZpJWkVKO+87MxN
Lx3hwLck/sY5egs1Bean8QSQeBkXXECA3uBoNNs/rAoi54joPFnMCbtaEdD7QbfH
T1YgGYOgHgUzA+5PxaTYsqjs0Ew43/Elrh7t0YT75rNO9GIe6JnMWIJB1SXFgA4/
LN29EwmtJMfDOQtONNF0/C0phmFKmM7Uh31hdys9A/9ioq2IytxE1rp0ruu5JBiK
BEPG/Dr3Fuc=
=7LKW
-----END PGP SIGNATURE-----