Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in ovirt-web-ui
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in ovirt-web-ui
ID: RHSA-2019:3024-01
Distribution: Red Hat
Plattformen: Red Hat Virtualization
Datum: Do, 10. Oktober 2019, 23:01
Referenzen: https://access.redhat.com/security/cve/CVE-2019-10744
https://access.redhat.com/security/cve/CVE-2019-11358
https://access.redhat.com/security/cve/CVE-2019-8331
Applikationen: ovirt-web-ui

Originalnachricht

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Moderate: ovirt-web-ui security and bug fix update
Advisory ID: RHSA-2019:3024-01
Product: Red Hat Virtualization
Advisory URL: https://access.redhat.com/errata/RHSA-2019:3024
Issue date: 2019-10-10
CVE Names: CVE-2019-8331 CVE-2019-10744 CVE-2019-11358
=====================================================================

1. Summary:

An update for ovirt-web-ui is now available for Red Hat Virtualization
Engine 4.3.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

RHV-M 4.3 - noarch

3. Description:

The ovirt-web-ui package provides the web interface for Red Hat
Virtualization.

Security Fix(es):

* nodejs-lodash: prototype pollution in defaultsDeep function leading to
modifying properties (CVE-2019-10744)

* bootstrap: XSS in the tooltip or popover data-template attribute
(CVE-2019-8331)

* js-jquery: prototype pollution in object's prototype leading to denial of
service or remote code execution or property injection (CVE-2019-11358)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Bug Fix(es):

* Known moderate severity security vulnerability detected by GitHub on
ovirt-web-ui components (BZ#1694032)

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/2974891

5. Bugs fixed (https://bugzilla.redhat.com/):

1686454 - CVE-2019-8331 bootstrap: XSS in the tooltip or popover data-template
attribute
1701972 - CVE-2019-11358 js-jquery: prototype pollution in object's
prototype leading to denial of service or remote code execution or property injection
1739497 - CVE-2019-10744 nodejs-lodash: prototype pollution in defaultsDeep
function leading to modifying properties

6. Package List:

RHV-M 4.3:

Source:
ovirt-web-ui-1.6.0-1.el7ev.src.rpm

noarch:
ovirt-web-ui-1.6.0-1.el7ev.noarch.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2019-8331
https://access.redhat.com/security/cve/CVE-2019-10744
https://access.redhat.com/security/cve/CVE-2019-11358
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2019 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBXZ9Q6NzjgjWX9erEAQic0BAAlnYKR+vQlSc6R/3/EtnVjBGNlt5DP+AS
pFCUs7nA+5tg+ff5g/ma4KfQVVHdZLm5MVPHu4Tm3t+8d6i7YnsSMwxWzLptbUFh
NY97Qfyh88DTQHL6cvt/3Cxueppamu0/VcnEZylz678Uu8zdLW5GtbnyuJmNALSx
WDSZhiZk08mpf3GO3QBuwQB7z7xHauCzBfwTblsngogNm9vOzjCmjDOX9W0XXbad
GzS8+mU+MkMymDxSs7virDeqOTT1cI29NKZJ3iil5b8JfxBibUms9nn6/znc7MOZ
QflPgZ2U81wW0u377oAJ8sWOmuUCRekj4RXJOLnhWMMRubQ4mKE5cfW1WT8cvn5t
7tkmg/2caLlUxHZJ+xQvclh/6m6Ylh9MCB7GlbCWt58pJc+gRjcvnDah8OrLr/8w
4AVvE2KVG0aTJXG1jN4gSJluXjSGysRR4CW8Z1MWxKTjo30/YfQAKURp2apSLS5L
Lm+TBRseZP2K4zMfKsT4JuF6uKli7segeZaMtywuFnCiCM3J20t2Zkqko8pmrqU4
CcfS4RgLpk6QS/wG3fjRy+f8+MBJV3iEt3/gmV4L+BspX2OAwoL9B5b+4rS4ztKT
YGJHHW9ak1cQjQVhA7JEgNcJ/2j0X7vyLdhLaEl2E77YrClLCd29R5E/1sQQwPN8
BWMFIsGDJwk=
=vdE2
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung