-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.1933
         Red Hat Virtualization Host security update [ovirt-4.4.6]
                                4 June 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Red Hat Virtualization Host
Publisher:         Red Hat
Operating System:  Red Hat
Impact/Access:     Access Privileged Data -- Remote/Unauthenticated
                   Denial of Service      -- Remote/Unauthenticated
                   Reduced Security       -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-36242 CVE-2020-28196 CVE-2020-25659

Reference:         ESB-2021.1741
                   ESB-2021.1716

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2021:2239

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: Red Hat Virtualization Host security update [ovirt-4.4.6]
Advisory ID:       RHSA-2021:2239-01
Product:           Red Hat Virtualization
Advisory URL:      https://access.redhat.com/errata/RHSA-2021:2239
Issue date:        2021-06-03
CVE Names:         CVE-2020-25659 CVE-2020-28196 CVE-2020-36242 
=====================================================================

1. Summary:

An update for imgbased, redhat-release-virtualization-host, and
redhat-virtualization-host is now available for Red Hat Virtualization 4
for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

RHEL 8-based RHEV-H for RHEV 4 (build requirements) - noarch, x86_64
Red Hat Virtualization 4 Hypervisor for RHEL 8 - x86_64
Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts - noarch

3. Description:

The redhat-virtualization-host packages provide the Red Hat Virtualization
Host. These packages include redhat-release-virtualization-host,
ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are
installed using a special build of Red Hat Enterprise Linux with only the
packages required to host virtual machines. RHVH features a Cockpit user
interface for monitoring the host's resources and performing administrative
tasks.

The redhat-virtualization-host packages provide the Red Hat Virtualization
Host. These packages include redhat-release-virtualization-host,
ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are
installed using a special build of Red Hat Enterprise Linux with only the
packages required to host virtual machines. RHVH features a Cockpit user
interface for monitoring the host's resources and performing administrative
tasks. 

The ovirt-node-ng packages provide the Red Hat Virtualization Host. These
packages include redhat-release-virtualization-host, ovirt-node, and
rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a
special build of Red Hat Enterprise Linux with only the packages required
to host virtual machines. RHVH features a Cockpit user interface for
monitoring the host's resources and performing administrative tasks.

Security Fix(es):

* python-cryptography: bleichenbacher timing oracle attack against RSA
decryption (CVE-2020-25659)

* krb5: unbounded recursion via an ASN.1-encoded Kerberos message in
lib/krb5/asn.1/asn1_encode.c may lead to DoS (CVE-2020-28196)

* python-cryptography: certain sequences of update() calls when
symmetrically encrypting very large payloads could result in an integer
overflow and lead to buffer overflows (CVE-2020-36242)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the References section.

Bug Fix(es):

* Previously, old RPM files were not properly removed during package
removal (uninistall) or upgrade. As a result, removed packages were
reinstalled, or, during and upgrade, the system tried to install two or
more different versions at once, causing the upgrade to fail.
In this release, the dnf plugin has been fixed, and RPM packages are now
properly removed.
The new version will also auto-heal the broken system by removing RPM
packages which are not supposed to be in the persisted-rpms directory.
(BZ#1936972)

* With this release, ovirt-hosted-engine-ha supports multiple,
comma-separated values for all iSCSI configuration items. (BZ#1909888)

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/2974891

5. Bugs fixed (https://bugzilla.redhat.com/):

1779052 - RHVH 4.4: AVC denied errors (dac_override) in audit.log
1882542 - [downstream] Failed to assign network to Infiniband Bond
1889988 - CVE-2020-25659 python-cryptography: bleichenbacher timing oracle attack against RSA decryption
1897893 - RHVH does not keep the same IPv6 address on each reprovision
1901041 - CVE-2020-28196 krb5: unbounded recursion via an ASN.1-encoded Kerberos message in lib/krb5/asn.1/asn1_encode.c may lead to DoS
1901878 - Rebase RHV-H on RHEL 8.4
1909888 - [RFE] Support multiple IQN in hosted-engine.conf for Active-Active DR setup
1926226 - CVE-2020-36242 python-cryptography: certain sequences of update() calls when symmetrically encrypting very large payloads could result in an integer overflow and lead to buffer overflows
1931443 - After reboot a RHV-H host fails to boot displaying error: ../../grub-core/loader/i386/pc/linux.c:170:invalid magic number
1936972 - [RHVH] Failed to reinstall persisted RPMs
1938925 - RHV-H iso needs to include NetworkManager-1.26.0-12.el8_3 or later.
1942580 - End User License Agreement trademarks Shadowman but not new logo
1944632 - Rebase RHV-H 4.4.6 on FDP 2.11 21.C
1946095 - "No valid network interface has been found" when starting HE deployment via cockpit
1948944 - RHVH 4.4.6 ISO (RHVH-4.4-20210412.3-RHVH-x86_64-dvd1.iso) installation failed
1949431 - The directory of EULA presented on the UI is incorrect
1957604 - oVirt logo appears in RHV-H under the virtualization tab

6. Package List:

Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts:

Source:
cockpit-ovirt-0.15.0-2.el8ev.src.rpm
ovirt-hosted-engine-ha-2.4.7-1.el8ev.src.rpm

noarch:
cockpit-ovirt-dashboard-0.15.0-2.el8ev.noarch.rpm
ovirt-hosted-engine-ha-2.4.7-1.el8ev.noarch.rpm

Red Hat Virtualization 4 Hypervisor for RHEL 8:

Source:
redhat-virtualization-host-4.4.6-20210527.3.el8_4.src.rpm

x86_64:
elfutils-debuginfo-0.182-3.el8.x86_64.rpm
elfutils-debuginfod-client-0.182-3.el8.x86_64.rpm
elfutils-debuginfod-client-debuginfo-0.182-3.el8.x86_64.rpm
elfutils-debuginfod-debuginfo-0.182-3.el8.x86_64.rpm
elfutils-debugsource-0.182-3.el8.x86_64.rpm
elfutils-libelf-debuginfo-0.182-3.el8.x86_64.rpm
elfutils-libs-debuginfo-0.182-3.el8.x86_64.rpm
redhat-virtualization-host-image-update-4.4.6-20210527.3.el8_4.x86_64.rpm

RHEL 8-based RHEV-H for RHEV 4 (build requirements):

Source:
imgbased-1.2.19-1.el8ev.src.rpm
redhat-release-virtualization-host-4.4.6-1.el8ev.src.rpm
scap-security-guide-0.1.54-1.el8ev.src.rpm

noarch:
imgbased-1.2.19-1.el8ev.noarch.rpm
python3-imgbased-1.2.19-1.el8ev.noarch.rpm
redhat-virtualization-host-image-update-placeholder-4.4.6-1.el8ev.noarch.rpm
scap-security-guide-rhv-0.1.54-1.el8ev.noarch.rpm

x86_64:
redhat-release-virtualization-host-4.4.6-1.el8ev.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2020-25659
https://access.redhat.com/security/cve/CVE-2020-28196
https://access.redhat.com/security/cve/CVE-2020-36242
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=LMTC
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=H+sm
-----END PGP SIGNATURE-----