RedHat: RHSA-2019-1571:01 Moderate: rhvm-appliance security, bug fix,

    Date20 Jun 2019
    CategoryRed Hat
    2673
    Posted ByLinuxSecurity Advisories
    An update for rhvm-appliance is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA256
    
    =====================================================================
                       Red Hat Security Advisory
    
    Synopsis:          Moderate: rhvm-appliance security, bug fix, and enhancement update
    Advisory ID:       RHSA-2019:1571-01
    Product:           Red Hat Virtualization
    Advisory URL:      https://access.redhat.com/errata/RHSA-2019:1571
    Issue date:        2019-06-20
    CVE Names:         CVE-2019-3804 
    =====================================================================
    
    1. Summary:
    
    An update for rhvm-appliance is now available for Red Hat Virtualization 4
    for Red Hat Enterprise Linux 7.
    
    Red Hat Product Security has rated this update as having a security impact
    of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
    gives a detailed severity rating, is available for each vulnerability from
    the CVE link(s) in the References section.
    
    2. Relevant releases/architectures:
    
    Red Hat Virtualization 4 Hypervisor for RHEL 7 - x86_64
    Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts - x86_64
    
    3. Description:
    
    The RHV-M Virtual Appliance automates the process of installing and
    configuring the Red Hat Virtualization Manager. The appliance is available
    to download as an OVA file from the Customer Portal.
    
    Security Fix(es):
    
    * cockpit: Crash when parsing invalid base64 headers (CVE-2019-3804)
    
    For more details about the security issue(s), including the impact, a CVSS
    score, acknowledgments, and other related information, refer to the CVE
    page(s) listed in the References section.
    
    4. Solution:
    
    For details on how to apply this update, which includes the changes
    described in this advisory, refer to:
    
    https://access.redhat.com/articles/2974891
    
    5. Bugs fixed (https://bugzilla.redhat.com/):
    
    1663567 - CVE-2019-3804 cockpit: Crash when parsing invalid base64 headers
    
    6. Package List:
    
    Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts:
    
    Source:
    rhvm-appliance-4.3-20190605.0.el7.src.rpm
    
    x86_64:
    rhvm-appliance-4.3-20190605.0.el7.x86_64.rpm
    
    Red Hat Virtualization 4 Hypervisor for RHEL 7:
    
    Source:
    rhvm-appliance-4.3-20190605.0.el7.src.rpm
    
    x86_64:
    rhvm-appliance-4.3-20190605.0.el7.x86_64.rpm
    
    These packages are GPG signed by Red Hat for security.  Our key and
    details on how to verify the signature are available from
    https://access.redhat.com/security/team/key/
    
    7. References:
    
    https://access.redhat.com/security/cve/CVE-2019-3804
    https://access.redhat.com/security/updates/classification/#moderate
    
    8. Contact:
    
    The Red Hat security contact is . More contact
    details at https://access.redhat.com/security/team/contact/
    
    Copyright 2019 Red Hat, Inc.
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1
    
    iQIVAwUBXQudKtzjgjWX9erEAQgepQ/8CFLqwtwDCTYDhkvoUptr0EJk1MeeMm40
    msEUhw2rOP+KEJK6eoWGx4ZdM1gWWTxHfTTzR3NjRiyVws4QzhgvS/beYIdW+grt
    q89CqXOaBvQdFN4OMvmRlFur9aq2IRX8JOzeT5Ke9AKV4qoN0t6uCePhNpGGtTvw
    chq/OnqZeyxazNCEhbTzdbyHseDXTv3acZisP2GGNeqmdIPX7ufzFHGTkoZL/JwP
    iWi3Z0fABgnlERjTWIdCp8VUw2T4txPQmIpKdILP6O6i7jKBvb5bCxh7FYeDcFuZ
    gRHgsQFLy1/TrAfknaoxy3E/EaomY4HPeM8uVWukFGhagOqK1tnbor/TZsdFIh9A
    YQfLW6KiO9I3QpUR3JghBasuF/WsUDlQIEM0aMBI2WBnQs/Qw5gfVkZubsS/uS/2
    GNbKVQGzLCWin+aMG5tLeiYO9R9g1Vns/1mvQVDseB7SFZGH59kRXpQlCW8AfRpr
    caiZbWAYuEgKZm8P95Lt/NBBC0QVVllcHNq7p0hsMa6vl88cAuwdkNFcTYSS6gUE
    KpOxk5TlMqaVVfNBjIbSnOD+YTi53HSxwB8D+SIR81+CaeAU1bBBLBljIGrCCln1
    mFnax28J0aRdHCOJaNWMR8s7zAea+1myRLQcJ1o/UmB4L0cqdnke+8gDuXg4BEjQ
    aEb1xZCkBO4=
    =7Cjf
    -----END PGP SIGNATURE-----
    
    --
    RHSA-announce mailing list
    This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.redhat.com/mailman/listinfo/rhsa-announce
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    Do you read our distribution advisories on a regular basis?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /component/communitypolls/?task=poll.vote&format=json
    23
    radio
    [{"id":"84","title":"Yes, for a single distribution","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"85","title":"Yes, for multiple distributions","votes":"5","type":"x","order":"2","pct":62.5,"resources":[]},{"id":"86","title":"No","votes":"3","type":"x","order":"3","pct":37.5,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    Advisories

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.