- Issued:
- 2019-11-06
- Updated:
- 2019-11-06
RHBA-2019:3268 - Bug Fix Advisory
Synopsis
CloudForms 4.7.12 bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update is now available for CloudForms Management Engine 5.10.
Description
Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller (MVC) framework for web application development. Action Pack implements the controller and the view components.
This update fixes various bugs and adds enhancements. Documentation for these changes is available from the Release Notes document linked to in the References section.
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
If the postgresql service is running, it will be automatically restarted after installing this update. After installing the updated packages, the httpd daemon will be restarted automatically.
Affected Products
- Red Hat CloudForms 4.7 x86_64
Fixes
- BZ - 1729166 - [Embedded Ansible] Getting error "[StandardError]: Embedded ansible is disabled" in evm.log
- BZ - 1753682 - [RFE] Automating the generation of widget content Via RESTAPI
- BZ - 1755393 - Service UI: Full automation code is loaded every time you open a service that was created using dynamic dialogs
- BZ - 1755405 - Clicking a custom button on a Virtual Infra Switch object does not display the button's dialog
- BZ - 1755632 - Retry interval is not set in VMCheckTransformed
- BZ - 1757148 - Failed snapshot UI notification shows sensitive information to customer
- BZ - 1757789 - Server looses its name when Authentication settings are changed
- BZ - 1758665 - Passwords stored in variables(extra_vars) are visible in clear text in the Appliance evm.log
- BZ - 1759252 - CVE-2019-16892 requires rubyzip >= 1.3
- BZ - 1760642 - EC2 SSA is failing by using existing AMI image.
- BZ - 1761525 - Creating a filter with a blank field triggers a 500 error
- BZ - 1761581 - CFME creates a single select Ansible dialog from a multi select Ansible template
- BZ - 1761866 - Date Created field showing UTC even though settings are set to specific timezone
- BZ - 1763856 - Service retirement got stuck when retiring the service by date
- BZ - 1763857 - Unable to delete container provider
- BZ - 1763859 - [RFE] launch_ansible_job fails to launch Ansible Tower workflow jobs
- BZ - 1763860 - RBAC: User unable to retire the service when role is EVMRole-user_self_service
- BZ - 1763861 - 'NOT' element can not be deleted for VM Advanced Filters in CloudForms
- BZ - 1763862 - System scheduled daily chargeback reports overloads queue
- BZ - 1764197 - multiple workers start the same retirement when retirement date is reached
- BZ - 1765582 - evm.log is full of error messages "cannot obtain exclusive access to locked queue"
- BZ - 1765583 - @vm.storage on some VMs result nil
CVEs
(none)
Red Hat CloudForms 4.7
SRPM | |
---|---|
cfme-5.10.12.3-1.el7cf.src.rpm | SHA-256: 6f98ae19f8d1398eb492c3d3fabeb1886a1f9c48b2855caf8e979de111bfbabe |
cfme-amazon-smartstate-5.10.12.3-1.el7cf.src.rpm | SHA-256: 3b72193368cbc65ad428a808b5b6721a58011201351df9fa9205b102250f91a0 |
cfme-appliance-5.10.12.3-1.el7cf.src.rpm | SHA-256: dfe4db23e4c0be1a8e4262f69e692abae937bb0ece7b82c231aa2d97da7c66f2 |
cfme-gemset-5.10.12.3-1.el7cf.src.rpm | SHA-256: 33914bf3cabd181fb96b825b968848690910807bcbd89aac603d840d4ca87bf4 |
ovirt-ansible-hosted-engine-setup-1.0.28-1.el7ev.src.rpm | SHA-256: 3a557943756c8e87eb03a9223b11d4d04afb48377621d989c2564925519448c4 |
ovirt-ansible-image-template-1.1.12-1.el7ev.src.rpm | SHA-256: 435badf4c7b439e55037b19f07c3ff8ae8e6be763fa332219e69675dae3a87d8 |
ovirt-ansible-vm-infra-1.1.21-1.el7ev.src.rpm | SHA-256: 259cef6f2bc4d7fd75c17cf1e2320c7d298201a9f659914adfc8e2ef3dab0b9e |
v2v-conversion-host-1.15.0-1.el7ev.src.rpm | SHA-256: b0f54a992af6ceb8d85e7ee656e9370b582dc58311d5b14398e8877f2579c1c9 |
x86_64 | |
ansible-tower-3.5.3-1.el7at.x86_64.rpm | SHA-256: bcd5430b2154ab16929e96c2eb5ed9861649cd4ce6b74f5afd793edf5c9955b7 |
ansible-tower-server-3.5.3-1.el7at.x86_64.rpm | SHA-256: e404e375fe2a0b332e62f6363e31ef3a72fdea93a648166bfaac8959c8e342ee |
ansible-tower-setup-3.5.3-1.el7at.x86_64.rpm | SHA-256: 6e0162ba7b5dc03098765d12a7484c3b1271c6a80b310411976e13681d53aae5 |
ansible-tower-ui-3.5.3-1.el7at.x86_64.rpm | SHA-256: ce02a56f04972d260c47c9178db826a9ebc97162b5b0496eeccd22a3fbc35e2d |
ansible-tower-venv-ansible-3.5.3-1.el7at.x86_64.rpm | SHA-256: b3a522399d32a3b19757bc6277ed89ffc9b782505807684e8b5dad07b433a593 |
ansible-tower-venv-tower-3.5.3-1.el7at.x86_64.rpm | SHA-256: 2bfabbe73e3f1da310e0a7377142f1108678aefedd90f22f0f4b9e7930aa4238 |
cfme-5.10.12.3-1.el7cf.x86_64.rpm | SHA-256: 9b181e90dd2e77d38ed000b30f0c69b148261f06f59588c0c87f7fe7c0813a2e |
cfme-amazon-smartstate-5.10.12.3-1.el7cf.x86_64.rpm | SHA-256: 4fb1ed7484faa66002a554059c7cfbf4849e5b5642990f0500ccf7d5155b2d96 |
cfme-appliance-5.10.12.3-1.el7cf.x86_64.rpm | SHA-256: b158636d40f8be316784bd2fd72ea59e7c83c7c0f35c37db6975beb82f325e35 |
cfme-appliance-common-5.10.12.3-1.el7cf.x86_64.rpm | SHA-256: 2db683796bdbd2cc37a7c2b4f9c51ad8abeeaa2e47fe39d57961694500e02462 |
cfme-appliance-debuginfo-5.10.12.3-1.el7cf.x86_64.rpm | SHA-256: 3cb8db332520e4bf9310bf693984cc1ae6ca7887c6b3aa0e7cd8d12af9059c4b |
cfme-appliance-tools-5.10.12.3-1.el7cf.x86_64.rpm | SHA-256: 0d7e23f88a97a588a57f34fdf6cdc0f10cd69c069ee56e93e7a3371f352e5f83 |
cfme-debuginfo-5.10.12.3-1.el7cf.x86_64.rpm | SHA-256: 80f1bb7d18af0ff0f517235378c5a0ca3d9211ac548c34b6f0642e7d242c087a |
cfme-gemset-5.10.12.3-1.el7cf.x86_64.rpm | SHA-256: cc48f1bf7fc9f587f107e06ec1c6658b7409abb9bc227f7eafbcc7fe1fba618c |
cfme-gemset-debuginfo-5.10.12.3-1.el7cf.x86_64.rpm | SHA-256: 250044caf9ef6085746e1754e05f70bda5c1ec3bed4a7fb24260d8e447a0ffe6 |
ovirt-ansible-hosted-engine-setup-1.0.28-1.el7ev.noarch.rpm | SHA-256: ad31934105e5e00b387fce79ffe74351330971d0252f6b888b1318478786b0c3 |
ovirt-ansible-image-template-1.1.12-1.el7ev.noarch.rpm | SHA-256: 085fabe4d5e3606d0b2e085ed42ed49b36beb71c3946d120ed4e1a498a388d7b |
ovirt-ansible-vm-infra-1.1.21-1.el7ev.noarch.rpm | SHA-256: 3a0c547e8a0416985673fda244d29967ac615380ba6292d791a690332b417b64 |
v2v-conversion-host-ansible-1.15.0-1.el7ev.noarch.rpm | SHA-256: ce3d1bb8881047dd6ca58baab16f85616717178da3b8c237e3f4c85dcc9f8bac |
v2v-conversion-host-wrapper-1.15.0-1.el7ev.noarch.rpm | SHA-256: c90b5086c8385c7881d2eef862132b38f08ab9a78c8aea81d81ba8ec0d15da63 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.