Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2020.0669 CloudForms security, bug fixes and updates 25 February 2020 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: CloudForms Publisher: Red Hat Operating System: Red Hat Impact/Access: Execute Arbitrary Code/Commands -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2019-14894 Original Bulletin: https://access.redhat.com/errata/RHSA-2020:0589 https://access.redhat.com/errata/RHSA-2020:0588 Comment: This bulletin contains two (2) Red Hat security advisories. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: CloudForms 4.7.15 security, bug fix and enhancement update Advisory ID: RHSA-2020:0589-01 Product: Red Hat CloudForms Advisory URL: https://access.redhat.com/errata/RHSA-2020:0589 Issue date: 2020-02-25 Cross references: RHBA-2020:0189 CVE Names: CVE-2019-14894 ===================================================================== 1. Summary: An update is now available for CloudForms Management Engine 5.10. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: CloudForms Management Engine 5.10 - x86_64 3. Description: Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller (MVC) framework for web application development. Action Pack implements the controller and the view components. Security Fix(es): * CloudForms: RCE vulnerability in NFS schedule backup (CVE-2019-14894) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: This update fixes various bugs and adds enhancements. Documentation for these changes is available from the Release Notes document linked to in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 If the postgresql service is running, it will be automatically restarted after installing this update. After installing the updated packages, the httpd daemon will be restarted automatically. 5. Bugs fixed (https://bugzilla.redhat.com/): 1769411 - CVE-2019-14894 CloudForms: RCE vulnerability in NFS schedule backup 1776343 - VM attached with active service(Orchestration) not getting displayed 1788564 - [RFE] Issue with VM reconfiguration dialog (adding networks) after recent upgrade 1794047 - Tower provider throws error when using v2 api endpoint 1794434 - Error occurs when comparing templates for infrastructure providers 1794436 - No route matches for comparing Datastore's Managed VMs 1794438 - Error occurs when comparing hosts in provider All Hosts view 1794542 - using "set retirement date" from the "services>workloads" section raises a " undefined method `find_by' for nil:NilClass" error 1794573 - vmotion migration (live migrations using the vmware tool) are not triggering vm migration control policies 1794732 - Error in evm log while retiring vm by new user 1798523 - Replication tab presenting 502 proxy error when remote site is down 6. Package List: CloudForms Management Engine 5.10: Source: cfme-5.10.15.1-1.el7cf.src.rpm cfme-amazon-smartstate-5.10.15.1-1.el7cf.src.rpm cfme-appliance-5.10.15.1-1.el7cf.src.rpm cfme-gemset-5.10.15.1-1.el7cf.src.rpm x86_64: cfme-5.10.15.1-1.el7cf.x86_64.rpm cfme-amazon-smartstate-5.10.15.1-1.el7cf.x86_64.rpm cfme-appliance-5.10.15.1-1.el7cf.x86_64.rpm cfme-appliance-common-5.10.15.1-1.el7cf.x86_64.rpm cfme-appliance-debuginfo-5.10.15.1-1.el7cf.x86_64.rpm cfme-appliance-tools-5.10.15.1-1.el7cf.x86_64.rpm cfme-debuginfo-5.10.15.1-1.el7cf.x86_64.rpm cfme-gemset-5.10.15.1-1.el7cf.x86_64.rpm cfme-gemset-debuginfo-5.10.15.1-1.el7cf.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2019-14894 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/documentation/en-us/red_hat_cloudforms/4.7/html/release_notes 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2020 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXlSzNtzjgjWX9erEAQhMIw//aUwbYKRfbF+rNjgl6yLvzz4svXCoKk85 QzoKPGmAp3AY0XW+yD3J1ucwF3/pTQ+a08puqVYXO5LFCJwtFIQekpI72TsShnNJ g99VyYctOP5AKlLuLf1k2Q5/xM6K67rOSwArNLiA6Rsc8T2L+bCI5oIyyePoRXlp kuoLqnvEjhOfl6E55LxUtDet00HxNA7onqpZXwpXED/vh7c3V/iqeAe9Tr23YEZF +stTEwn/7yvSlda08WbI++epPtxAwdXs0zMbsx7BdOXg3eu91tqgp2kFbWVBUqx5 LXHNLdQ2oTsm22A+hrq9Ob4/j20M/W8YehTFuX/V4nALg+vi5h7pakPnUB7+Zdsd zu2MC/uNUhjcvBeH10LbG81/RqrgwGAGTDNMF+fKruGm0gM6Rs0TdogWY16dCwIy lD8stxbiGewykjKfn6KXuvhSbn3BCN5dGD5US1D1ritkoCulpSCnJCHvIZszD/rm jxvxHjitXigOYZh9uFxRxFsPnTZAuF6itav40vEhe/z1P0VRWuKt5JrAkiXPQzXF CBuF0P6dHash4mU+o0UiHXUX/X2+ecZRYFAIWNBPUTAN1ik3KBLtd8FAiEtKryyX y/An1vJatFU5Tji0i8eP0XoFmHY9WFXDSdnWKoej7XLHuCnJeR8CvXuve9H8aLzh elwctdwEp38= =hI5c - -----END PGP SIGNATURE----- - -------------------------------------------------------------------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: CloudForms 5.0.3 security update Advisory ID: RHSA-2020:0588-01 Product: Red Hat CloudForms Advisory URL: https://access.redhat.com/errata/RHSA-2020:0588 Issue date: 2020-02-25 Cross references: RHBA-2020:0452 CVE Names: CVE-2019-14894 ===================================================================== 1. Summary: An update is now available for CloudForms Management Engine 5.11. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: CloudForms Management Engine 5.11 - x86_64 3. Description: Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller (MVC) framework for web application development. Action Pack implements the controller and the view components. Security Fix(es): * CloudForms: RCE vulnerability in NFS schedule backup (CVE-2019-14894) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 If the postgresql service is running, it will be automatically restarted after installing this update. After installing the updated packages, the httpd daemon will be restarted automatically. 5. Bugs fixed (https://bugzilla.redhat.com/): 1769411 - CVE-2019-14894 CloudForms: RCE vulnerability in NFS schedule backup 6. Package List: CloudForms Management Engine 5.11: Source: cfme-5.11.3.1-1.el8cf.src.rpm cfme-amazon-smartstate-5.11.3.1-1.el8cf.src.rpm cfme-appliance-5.11.3.1-1.el8cf.src.rpm cfme-gemset-5.11.3.1-1.el8cf.src.rpm x86_64: cfme-5.11.3.1-1.el8cf.x86_64.rpm cfme-amazon-smartstate-5.11.3.1-1.el8cf.x86_64.rpm cfme-appliance-5.11.3.1-1.el8cf.x86_64.rpm cfme-appliance-common-5.11.3.1-1.el8cf.x86_64.rpm cfme-appliance-tools-5.11.3.1-1.el8cf.x86_64.rpm cfme-gemset-5.11.3.1-1.el8cf.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2019-14894 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/documentation/en-us/red_hat_cloudforms/5.0/html/release_notes 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2020 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXlSyv9zjgjWX9erEAQh44Q/9E5uIBeWkfp47qn3Yti8hNgbp747vUqd/ jm6EfGlsjsMcR3uSYKGn7byHxKWVs2YXJA5YzdV3Wq4a2wgM8Y1kro3wvLdOu+Ak woAuEv1VZRQK9EMhg1cGYf4b8ZMBUr6h5SzeLmw7FgFcFiFartlVj2yn6k57vwMZ INPi2SGece5NCxXM466Ksr7oizVtOrZvuV7XqnDp0hH54JEw/8M6vH9bsM1M1NLZ 5y//1upNpPdy0eaIbuyOuu25aV8VBshipnhnizdyb7jFsxZ8tiYy97Va6FsH9R2A 1VbIVPMJb24XlfmtZ4hLdtGVkh6rFWXgmhunn8yrPfWaG8yczPqO1g9QCmt9y8wU veehMhPATZyMekkxJarjC5PSbhpF0o5oXL1PWXdGMCOaYmF+wCv/ZfUFu/yiat2K oY5wZoI8Cb0N6AIGAh17v3H2P3QMl41g41T9w9nZt0HzY5SvZrh34kviQW2/hink WKY+MVtAD8oMR8BIQouxiaYfju4XMk03LGOVfJUjGJZhP2zSU5VytIsll8mqjtzA h8UaJqPp3A2J4WgAzleL3+85wITHRbPvyaGlwhSZsS+xyMP6olwSYSOgViaFsiiv yJzresrOuLGLXMi3ltf70wQwY2u0k126F9t9IFNhHNVYg2+v2Pn3IGif/7FOmBeU U9zp/DrQ354= =oMfo - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXlTOSWaOgq3Tt24GAQh30RAAxv/hr5U9lrvUGuFjwI87ofLUmaFmXbii 41p8lqPUV3gwas5IUZJpYwU6WXVUykg0fBpPSJReU6fpQ8SbgaFLgLcf0ODqbKyR 3/f5ry6pzNpfzfxk9vl71y+Rct8JOsyM0lU49XAMDCl5v+k3JWlRttL7yyBINvyl 7Hwnq1EuSBJ6j+m9K+s1a1ii6O0qeSmHQMFWkz9MkasIyiZAwEP+vvtsAWRrV4Mp 9gNg+lFnyuWeje59XtgLokWLkBcDoj1bQios+or2dKDwMKt2VMMsBnGUe8Hv9qXv OmypjW/5CyNU6i5lPo58j+DViX66QtY7eHvmvylAlK9aVjB02ODBfbo/XKT9e7I7 txn2hzE+aTHouhvEn3adfBtUUgE/X6mEDzzpgAi/oMd0MnAZRR1GI6+d4/W/+tCt JZaEBuyFf6J4ahZMW40oeo7CbC6F0qSB1PCFp0LWHZ86qZ03cDJhP1HLUk8YsdZY 6udM0fUTVvFiWzbZZqrKCfaYZLJRu9AS7Qr0WhMnORGzZDDFc10hD95pckNuQT+D gR9CJsqxaSZQ/lRvBzO5Sd1EOpW+KHoSSsTkeQ7ekZ6J8paqrLyyHSy4NDmipoC9 jqVmHVYqZbkLrEk/xNJucnM6PxDKC/d00IDyENEH0rczJBEkTe8f3RUi6kphov7g 7KLWYEZiSbI= =DQPU -----END PGP SIGNATURE-----