ESB-2018.1874 - [RedHat] Red Hat Virtualization Manager: Access confidential data - Existing account 2018-06-28

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2018.1874
 Red Hat Virtualization Manager security, bug fix, and enhancement update
                               28 June 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Red Hat Virtualization Manager
Publisher:         Red Hat
Operating System:  Red Hat
Impact/Access:     Access Confidential Data -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-1075 CVE-2018-1072 

Reference:         ESB-2018.1533

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2018:2071

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: Red Hat Virtualization Manager security, bug fix, and enhancement update
Advisory ID:       RHSA-2018:2071-01
Product:           Red Hat Virtualization
Advisory URL:      https://access.redhat.com/errata/RHSA-2018:2071
Issue date:        2018-06-27
CVE Names:         CVE-2018-1072 CVE-2018-1075 
=====================================================================

1. Summary:

An update for org.ovirt.engine-root is now available for Red Hat
Virtualization Manager 4.2.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

RHV-M 4.2 - noarch

3. Description:

The Red Hat Virtualization Manager is a centralized management platform
that allows system administrators to view and manage virtual machines. The
Manager provides a comprehensive range of features including search
capabilities, resource management, live migrations, and virtual
infrastructure provisioning.

The Manager is a JBoss Application Server application that provides several
interfaces through which the virtual environment can be accessed and
interacted with, including an Administration Portal, a User Portal, and a
Representational State Transfer (REST) Application Programming Interface
(API).

The following packages have been upgraded to a later version: 

* org.ovirt.engine-root (4.2.4.5). (BZ#1576752)

Security Fix(es):

* ovirt-engine: Unfiltered password when choosing manual db provisioning
(CVE-2018-1075)

* ovirt-engine-setup: unfiltered db password in engine-backup log
(CVE-2018-1072)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the References section.

These issues were discovered by Yedidyah Bar David (Red Hat).

Bug Fix(es):

* This update enables engine-setup to upgrade PostgreSQL 9.2 to 9.5, even
when the locale of the 9.2 database is different from the system locale.
(BZ#1579268)

* This update fixes an inefficient query that is generated when users click
on the 'Users' tab in the Administration Portal. The fix ensures that the
tab loads quicker. (BZ#1583619)

Enhancement(s):

* The storage domain's General sub-tab in the Administration Portal now
shows the number of images on the storage domain under the rubric "Images",
this corresponds to the number of LVs on a block domain. (BZ#1587885)

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/2974891

5. Bugs fixed (https://bugzilla.redhat.com/):

1098612 - [donstream clone 4.2.4] [RFE] filter for "Allocation Policy" in Disks search
1251468 - [RFE] Additional warning when removing required networks
1542508 - CVE-2018-1075 ovirt-engine: Unfiltered password when choosing manual db provisioning
1575081 - VMs will fail to start in a cluster which is having display network having name greater than 15 characters
1576352 - rhvm-4.2 reports "no updates found" although there is available updates
1576752 - Number of "Prestarted VMs" is ignored and all VMs of Pool starts after editing existing Pool.
1579268 - Upgrade of PostgreSQL during RHV 4.1 to 4.2 upgrade fails with locale mismatch
1582822 - [UI] - Interface name is gone in the Network Interfaces sub tab
1583579 - [downstream clone - 4.2.4] Very slow UI if Host has many (~64) elements (VFs or dummies or networks)
1583619 - [downstream clone - 4.2.4] [SCALE] Listing users in Users tab overloads the postgresql DB (CPU)
1584885 - VM remains migrating forever with no Host (actually doesn't exist) after StopVmCommand fails to DestroyVDS
1585013 - [downstream clone - 4.2.4] ovirt-engine loses track of a cancelled disk
1585039 - [downstream clone - 4.2.4] Live Storage Migration continued on after snapshot creation hung and timed out
1585157 - [downstream clone - 4.2.4] [UI] - VM's network interface name and icon too large and wrap
1585454 - [downstream clone - 4.2.4] Uploaded image: Virtual Size of qcow2 image is not reflected at guest OS level
1585455 - [downstream clone - 4.2.4] Move disk failed but delete was called on source sd, losing all the data
1585456 - [downstream clone - 4.2.4] ovirt-engine fails to start when having a large number of stateless snapshots
1585950 - [downstream clone - 4.2.4] Live Merge failed on engine with "still in volume chain", but merge on host was successful
1587884 - [downstream clone - 4.2.4] [RFE] Include storage domain UUID in Storage Domain 'General' tab
1587885 - [downstream clone - 4.2.4] [RFE] Need a way to track how many logical volumes consumed in a storage domain and alert when it gets full

6. Package List:

RHV-M 4.2:

Source:
ovirt-engine-4.2.4.5-0.1.el7_3.src.rpm

noarch:
ovirt-engine-4.2.4.5-0.1.el7_3.noarch.rpm
ovirt-engine-backend-4.2.4.5-0.1.el7_3.noarch.rpm
ovirt-engine-dbscripts-4.2.4.5-0.1.el7_3.noarch.rpm
ovirt-engine-extensions-api-impl-4.2.4.5-0.1.el7_3.noarch.rpm
ovirt-engine-extensions-api-impl-javadoc-4.2.4.5-0.1.el7_3.noarch.rpm
ovirt-engine-health-check-bundler-4.2.4.5-0.1.el7_3.noarch.rpm
ovirt-engine-lib-4.2.4.5-0.1.el7_3.noarch.rpm
ovirt-engine-restapi-4.2.4.5-0.1.el7_3.noarch.rpm
ovirt-engine-setup-4.2.4.5-0.1.el7_3.noarch.rpm
ovirt-engine-setup-base-4.2.4.5-0.1.el7_3.noarch.rpm
ovirt-engine-setup-plugin-ovirt-engine-4.2.4.5-0.1.el7_3.noarch.rpm
ovirt-engine-setup-plugin-ovirt-engine-common-4.2.4.5-0.1.el7_3.noarch.rpm
ovirt-engine-setup-plugin-vmconsole-proxy-helper-4.2.4.5-0.1.el7_3.noarch.rpm
ovirt-engine-setup-plugin-websocket-proxy-4.2.4.5-0.1.el7_3.noarch.rpm
ovirt-engine-tools-4.2.4.5-0.1.el7_3.noarch.rpm
ovirt-engine-tools-backup-4.2.4.5-0.1.el7_3.noarch.rpm
ovirt-engine-vmconsole-proxy-helper-4.2.4.5-0.1.el7_3.noarch.rpm
ovirt-engine-webadmin-portal-4.2.4.5-0.1.el7_3.noarch.rpm
ovirt-engine-websocket-proxy-4.2.4.5-0.1.el7_3.noarch.rpm
rhvm-4.2.4.5-0.1.el7_3.noarch.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2018-1072
https://access.redhat.com/security/cve/CVE-2018-1075
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2018 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=Saa5
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBWzQ022aOgq3Tt24GAQis7xAAucu4K7p0KehVK340KV/iBgreNkHwhYIA
m3RN0opkddbGe4FMeUy9uBMzLHiM7LyZ7WRDrJpk1giO67E2iN4EjqBSZr1h01pe
w0hOTdWeGtj1PxiX1K5y3nH/KYIZbBqCe6u/fr+0WEiA48WpG017QlcNvJn77xhs
wl2zik+K/2yRZNmDjMAXpasRvMXdqVs2OeeCvWZkNu2uC8oh5bLQRrsPqSEbP4/A
zBLBIoCmk55+cEQTLqEeYVrBUZhf6Uy5/rZm9ULmpYWj9cbposHNIHia4e2VUa7K
KS+8pHlh5ClS5zVSWPhz3TGHwQw3yu/qn3lNKaMSwyimBchg8mDZm77ukltAldL4
bH+5yMS12dL7XkhLLziElHk14h/AC8gMmsBFHoKnVuINoqkWVVUoyoeyKl3XAZRg
nJsu/L0Bp/9ollzvhUHQOtIXn2Y/zOp/5uBqDSTbS0KlZD+cP848y1Ex8lwloRwy
Wb43SDGDSN4YlJUmsHnvLKC0NcsNLoHKHTUGsV9M4Aw2Y4scu74qo80pvAHhO4/F
T8avRHRLVBkS9digONuk59fC1pmpXtU5c3MjUjLmNWYx6+luSGZwcDwQ+egrgHC2
eLY2H/TZmuyrhZE4WR3lLT76NZIVuDYqdZKmkf8ZKPoG7UnliI3Prv2bbaZ1tRkh
7Qoj/TqdKc4=
=oSp0
-----END PGP SIGNATURE-----

« Back to bulletins