Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2019:1289 - Security Advisory
Issued:
2019-05-29
Updated:
2019-05-29

RHSA-2019:1289 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: CloudForms 4.6.9 security, bug fix and enhancement update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update is now available for CloudForms Management Engine 5.9.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller (MVC) framework for web application development. Action Pack implements the controller and the view components.

Security Fix(es):

  • rubygem-actionpack: render file directory traversal in Action View (CVE-2019-5418)
  • rubygem-actionpack: denial of service vulnerability in Action View (CVE-2019-5419)

For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

This update fixes various bugs and adds enhancements. Documentation for these changes is available from the Release Notes document linked to in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

If the postgresql service is running, it will be automatically restarted after installing this update. After installing the updated packages, the httpd daemon will be restarted automatically.

Affected Products

  • Red Hat CloudForms 4.6 x86_64

Fixes

  • BZ - 1688871 - Unable to see dialog details passed to catalog after upgrade from 5.9.4 to 5.9.6
  • BZ - 1689159 - CVE-2019-5418 rubygem-actionpack: render file directory traversal in Action View
  • BZ - 1689160 - CVE-2019-5419 rubygem-actionpack: denial of service vulnerability in Action View
  • BZ - 1695655 - [RFE] Metrics for memory usage of AWS instances needs to be collected from CloudWatch new Agent
  • BZ - 1696363 - Different syntax by Service Request in Master region
  • BZ - 1704340 - OpenStack Snapshot Image Doesn't Inherit the Same Cloud Tenant as the Instance

CVEs

  • CVE-2019-5418
  • CVE-2019-5419

References

  • https://access.redhat.com/security/updates/classification/#important
  • https://access.redhat.com/documentation/en-us/red_hat_cloudforms/4.6/html/release_notes
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat CloudForms 4.6

SRPM
cfme-5.9.9.3-1.el7cf.src.rpm SHA-256: 58627face07dfd8d0cc96ad65e84e09dd667fb509486bb996c44739fad7cb3b7
cfme-amazon-smartstate-5.9.9.3-1.el7cf.src.rpm SHA-256: 8a24e392cec19c62189ef783d9f789304d472d406367ed76620e342c7f03bfd8
cfme-appliance-5.9.9.3-1.el7cf.src.rpm SHA-256: a40bc62007edc6d82bf04aa7aefc5cc0542a7e258cd490f471ee8090e44ca733
cfme-gemset-5.9.9.3-1.el7cf.src.rpm SHA-256: 504c8797a389b50d1f1743c5142b7e4c5436d9a31c30b348b4efff25adc19c15
x86_64
cfme-5.9.9.3-1.el7cf.x86_64.rpm SHA-256: e41f2a6abf73699024b3b73d7f102d9e9eca8c3c4992cbe5a33774f6bed04ba5
cfme-amazon-smartstate-5.9.9.3-1.el7cf.x86_64.rpm SHA-256: 7285afd4819f722df1afb5905f0c75af89a2da5212062c892be659b25780d4d8
cfme-appliance-5.9.9.3-1.el7cf.x86_64.rpm SHA-256: 27ea96cdbeb26bfa33eb5792efe615975dc0b2065ca6eb0a5624dd440fa52519
cfme-appliance-common-5.9.9.3-1.el7cf.x86_64.rpm SHA-256: 4507eea763ef7380c24d6337741857c9cadb4e4199da3832e477f29e7259843e
cfme-appliance-debuginfo-5.9.9.3-1.el7cf.x86_64.rpm SHA-256: 2f9d1ee8d85b71bc338e3109635cacf77585b46ee63326ebb50fe6e38ed66e26
cfme-appliance-tools-5.9.9.3-1.el7cf.x86_64.rpm SHA-256: 809e5612f49d46d5a9e5eabb08dcabe8ffe394b45e37750f1cc589924a0a3825
cfme-debuginfo-5.9.9.3-1.el7cf.x86_64.rpm SHA-256: 818061728618d6ef7f6561079abadd374264cab85a89c6a9e60c53f71d55aa0a
cfme-gemset-5.9.9.3-1.el7cf.x86_64.rpm SHA-256: 9156d86a0b4c5b19f56906da93bcac6e10fcc63c241282914cbd6526fc07a137
cfme-gemset-debuginfo-5.9.9.3-1.el7cf.x86_64.rpm SHA-256: 7aafc11778d05b45be401f00900e2670889befbeac1f3df4d38b376a6f970337

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility