Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.1933 Red Hat Virtualization Host security update [ovirt-4.4.6] 4 June 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Red Hat Virtualization Host Publisher: Red Hat Operating System: Red Hat Impact/Access: Access Privileged Data -- Remote/Unauthenticated Denial of Service -- Remote/Unauthenticated Reduced Security -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2020-36242 CVE-2020-28196 CVE-2020-25659 Reference: ESB-2021.1741 ESB-2021.1716 Original Bulletin: https://access.redhat.com/errata/RHSA-2021:2239 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: Red Hat Virtualization Host security update [ovirt-4.4.6] Advisory ID: RHSA-2021:2239-01 Product: Red Hat Virtualization Advisory URL: https://access.redhat.com/errata/RHSA-2021:2239 Issue date: 2021-06-03 CVE Names: CVE-2020-25659 CVE-2020-28196 CVE-2020-36242 ===================================================================== 1. Summary: An update for imgbased, redhat-release-virtualization-host, and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: RHEL 8-based RHEV-H for RHEV 4 (build requirements) - noarch, x86_64 Red Hat Virtualization 4 Hypervisor for RHEL 8 - x86_64 Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts - noarch 3. Description: The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. The ovirt-node-ng packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. Security Fix(es): * python-cryptography: bleichenbacher timing oracle attack against RSA decryption (CVE-2020-25659) * krb5: unbounded recursion via an ASN.1-encoded Kerberos message in lib/krb5/asn.1/asn1_encode.c may lead to DoS (CVE-2020-28196) * python-cryptography: certain sequences of update() calls when symmetrically encrypting very large payloads could result in an integer overflow and lead to buffer overflows (CVE-2020-36242) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Previously, old RPM files were not properly removed during package removal (uninistall) or upgrade. As a result, removed packages were reinstalled, or, during and upgrade, the system tried to install two or more different versions at once, causing the upgrade to fail. In this release, the dnf plugin has been fixed, and RPM packages are now properly removed. The new version will also auto-heal the broken system by removing RPM packages which are not supposed to be in the persisted-rpms directory. (BZ#1936972) * With this release, ovirt-hosted-engine-ha supports multiple, comma-separated values for all iSCSI configuration items. (BZ#1909888) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/2974891 5. Bugs fixed (https://bugzilla.redhat.com/): 1779052 - RHVH 4.4: AVC denied errors (dac_override) in audit.log 1882542 - [downstream] Failed to assign network to Infiniband Bond 1889988 - CVE-2020-25659 python-cryptography: bleichenbacher timing oracle attack against RSA decryption 1897893 - RHVH does not keep the same IPv6 address on each reprovision 1901041 - CVE-2020-28196 krb5: unbounded recursion via an ASN.1-encoded Kerberos message in lib/krb5/asn.1/asn1_encode.c may lead to DoS 1901878 - Rebase RHV-H on RHEL 8.4 1909888 - [RFE] Support multiple IQN in hosted-engine.conf for Active-Active DR setup 1926226 - CVE-2020-36242 python-cryptography: certain sequences of update() calls when symmetrically encrypting very large payloads could result in an integer overflow and lead to buffer overflows 1931443 - After reboot a RHV-H host fails to boot displaying error: ../../grub-core/loader/i386/pc/linux.c:170:invalid magic number 1936972 - [RHVH] Failed to reinstall persisted RPMs 1938925 - RHV-H iso needs to include NetworkManager-1.26.0-12.el8_3 or later. 1942580 - End User License Agreement trademarks Shadowman but not new logo 1944632 - Rebase RHV-H 4.4.6 on FDP 2.11 21.C 1946095 - "No valid network interface has been found" when starting HE deployment via cockpit 1948944 - RHVH 4.4.6 ISO (RHVH-4.4-20210412.3-RHVH-x86_64-dvd1.iso) installation failed 1949431 - The directory of EULA presented on the UI is incorrect 1957604 - oVirt logo appears in RHV-H under the virtualization tab 6. Package List: Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts: Source: cockpit-ovirt-0.15.0-2.el8ev.src.rpm ovirt-hosted-engine-ha-2.4.7-1.el8ev.src.rpm noarch: cockpit-ovirt-dashboard-0.15.0-2.el8ev.noarch.rpm ovirt-hosted-engine-ha-2.4.7-1.el8ev.noarch.rpm Red Hat Virtualization 4 Hypervisor for RHEL 8: Source: redhat-virtualization-host-4.4.6-20210527.3.el8_4.src.rpm x86_64: elfutils-debuginfo-0.182-3.el8.x86_64.rpm elfutils-debuginfod-client-0.182-3.el8.x86_64.rpm elfutils-debuginfod-client-debuginfo-0.182-3.el8.x86_64.rpm elfutils-debuginfod-debuginfo-0.182-3.el8.x86_64.rpm elfutils-debugsource-0.182-3.el8.x86_64.rpm elfutils-libelf-debuginfo-0.182-3.el8.x86_64.rpm elfutils-libs-debuginfo-0.182-3.el8.x86_64.rpm redhat-virtualization-host-image-update-4.4.6-20210527.3.el8_4.x86_64.rpm RHEL 8-based RHEV-H for RHEV 4 (build requirements): Source: imgbased-1.2.19-1.el8ev.src.rpm redhat-release-virtualization-host-4.4.6-1.el8ev.src.rpm scap-security-guide-0.1.54-1.el8ev.src.rpm noarch: imgbased-1.2.19-1.el8ev.noarch.rpm python3-imgbased-1.2.19-1.el8ev.noarch.rpm redhat-virtualization-host-image-update-placeholder-4.4.6-1.el8ev.noarch.rpm scap-security-guide-rhv-0.1.54-1.el8ev.noarch.rpm x86_64: redhat-release-virtualization-host-4.4.6-1.el8ev.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2020-25659 https://access.redhat.com/security/cve/CVE-2020-28196 https://access.redhat.com/security/cve/CVE-2020-36242 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2021 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYLiuodzjgjWX9erEAQit1A//dTaSQPDCNJueVoXMfOtlWSKRga3p9A9T HUz3EfrOKXLl9FzPR3+8xOGK0lhzNXPLBQqsEtZu3ur/+sT5zu+uPQzsKXjPXEod LR43Y6QYbibKI8I3pudBmeqVibtenx7ZR/1EJSUj0WHxqSu4gIdhCM1oYhUKliC6 UTSi7RkEJqhFwRjhYBOVuot/ZYA2TM5Uun1VEgYULVmU32bRZ9rB2boxbpBeIaBQ EB1A8nRcNdOltfFm5D0OH4mx/likGLOmwNszB+96yR3nEoVqXh3HMX3zTU+vsJWI wjkg4muoJoZFt2Rja9fd9WPuTqdoGVdsYE/9iWzvn2aRHStdOc0YA8NTTmXt+y/4 ozTxOh/Rw0oT0h4tXvePAQPUEG7VtHc1GAHHCpvrV6LVcO3NXF2a0Dzz+c0YMOFJ XRGoLPYgoLaIw5sXx1DrtLBauJp8bUlXa8G92WUZdhGkr/KnAmLA7xFoVaQxxwaV uqGd9v+088XLM9kNEIinZdU6rsTXGoIAzPV4BlD+kU7A512h42I0DjtJs5IxjAFd IBY9gOPA1fYdxMwJWj3GmDOIxgsP4v+ha8buYK8C2SxBnUwdNUB7nzsKxqEi4v7a tKm0WgV0GcvqtjrC4YbcZr93rDKsDDLLx5afbW4142NMBKdRBxVBbyVt6zZmzx0m cYuswBA+Nko= =LMTC - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYLl0L+NLKJtyKPYoAQiG9w/+MC8nfElMOeBCAEw/71It6fu5/zsh8c5i om3WPS/B4z6y3hCqv1SpeeK4IX+lJECib13viFBKgyuisgxdLcMvzcroEmrMe0XW C6MJDIscUhZxvm3xC0OwAApcQB3YV1v+vE0AX7i4JZNWvCdnANlZCVTikHePkwSV 9odFaA5GzNFEVmO2F2PkNj9JcNmrBcM7O1uNTp7DXtpNWomjfvERMd+7lF/GAZyc udl3Wr92i3iMT8qAWZytGyR54Zqs/Ucz/wG9KTif/0IpfTRFtWbuCLDqByxHrS9d xl/7dxZGHNfCrIhd+r1Q2Ei6z9JpZi0p0+hZ2VIMAGVzs50OdgUmis3gvAS2Ar1A 5F8jm3MCXI6x7hvikXtnP7oHdZ5G6QdMOqF3iyYq7AJiTi4JFPLpcJ54Weuzujk2 eHgsXmDv01jUxuQbkQIi5x++FG2ZZbHP4FAsfMBGpCQ6tPOQ3ZxLH7YMmSFIFP6C ynrahxZu7R0ieg54yhu8vMQUq++3Kr1935M0unsjnkJHAptMNPWzkPx9MOfEVL7S mTXys6T6zZRWczRxwQVrS+n5Xvbov0DiCKnXFZjX/CpZjDdhNpPNUEUvtWfusCND PmSxba/4IEgcqz9eHPw62rWi4UG2wwoDF3MCsYHX2KcVaIFTRONmKltN6gvyhNWI 4Vn4uxANfqM= =H+sm -----END PGP SIGNATURE-----