Headline
RHSA-2022:4931: Red Hat Security Advisory: RHV Appliance (rhvm-appliance) security update [ovirt-4.5.0]
Updated RHV-M Appliance packages that fix several bugs and add various enhancements are now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2021-3677: postgresql: memory disclosure in certain queries
Skip to navigation Skip to main content
Utilities
- Subscriptions
- Downloads
- Containers
- Support Cases
Infrastructure and Management
- Red Hat Enterprise Linux
- Red Hat Virtualization
- Red Hat Identity Management
- Red Hat Directory Server
- Red Hat Certificate System
- Red Hat Satellite
- Red Hat Subscription Management
- Red Hat Update Infrastructure
- Red Hat Insights
- Red Hat Ansible Automation Platform
Cloud Computing
- Red Hat OpenShift
- Red Hat CloudForms
- Red Hat OpenStack Platform
- Red Hat OpenShift Container Platform
- Red Hat OpenShift Data Science
- Red Hat OpenShift Online
- Red Hat OpenShift Dedicated
- Red Hat Advanced Cluster Security for Kubernetes
- Red Hat Advanced Cluster Management for Kubernetes
- Red Hat Quay
- Red Hat CodeReady Workspaces
- Red Hat OpenShift Service on AWS
Storage
- Red Hat Gluster Storage
- Red Hat Hyperconverged Infrastructure
- Red Hat Ceph Storage
- Red Hat OpenShift Data Foundation
Runtimes
- Red Hat Runtimes
- Red Hat JBoss Enterprise Application Platform
- Red Hat Data Grid
- Red Hat JBoss Web Server
- Red Hat Single Sign On
- Red Hat support for Spring Boot
- Red Hat build of Node.js
- Red Hat build of Thorntail
- Red Hat build of Eclipse Vert.x
- Red Hat build of OpenJDK
- Red Hat build of Quarkus
Integration and Automation
- Red Hat Process Automation
- Red Hat Process Automation Manager
- Red Hat Decision Manager
All Products
Issued:
2022-06-07
Updated:
2022-06-07
RHSA-2022:4931 - Security Advisory
- Overview
- Updated Packages
Synopsis
Moderate: RHV Appliance (rhvm-appliance) security update [ovirt-4.5.0]
Type/Severity
Security Advisory: Moderate
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
Updated RHV-M Appliance packages that fix several bugs and add various enhancements are now available.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The RHV-M Appliance automates the process of installing and configuring the Red Hat Virtualization Manager. The appliance is available to download as an OVA file from the Customer Portal.
Security Fix(es):
- postgresql: memory disclosure in certain queries (CVE-2021-3677)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- RHV-M Appliance rebased on RHEL 8.6 (BZ#1997073)
- Previously, a self-hosted engine deployment failed when an OpenSCAP security profile was applied, resulting in the SSH key permissions being changed to 0640. In this release, the permissions are not changed and the deployment succeeds. (BZ#2011309)
- rng-tools, rsyslog-gnutls, usbguard packages added to the RHV-M Appliance to comply with DISA-STIG profile requirements (BZ#2070963)
- OVA package manifest added to the RHV-M Appliance RPM. (BZ#2070980)
- Previously, the nodejs package was downgraded during the RHV-M installation.
In this release, the correct version of the nodejs package is installed and maintained. (BZ#2075852)
- RHV-M Appliance rebased on Ceph 4.3 (BZ#2090137)
Affected Products
- Red Hat Virtualization 4 for RHEL 8 x86_64
- Red Hat Virtualization Host 4 for RHEL 8 x86_64
Fixes
- BZ - 1958396 - RHV installation process downgrades some packages
- BZ - 1997073 - Rebase RHV-M Appliance on RHEL 8.6.0
- BZ - 2001857 - CVE-2021-3677 postgresql: memory disclosure in certain queries
- BZ - 2011309 - sshd service fails to start after rebooting to apply FIPS settings
- BZ - 2050071 - Use authselect in RHV-H and appliance images
- BZ - 2056146 - Hosted engine deployed failed since no enabled repositories can be found for engine setup.
- BZ - 2070963 - Include packages needed by DISA STIG
- BZ - 2070980 - [RFE] Include a manifest in the rpm
- BZ - 2073965 - [Hosted Engine]Error message “Destination directory /etc/fapolicyd/rules.d does not exist” is displayed but it is existed
- BZ - 2075852 - nodejs module not enabled causes nodejs downgrade to version 10
- BZ - 2090137 - Rebase rhvm-appliance on ceph 4.3
Red Hat Virtualization 4 for RHEL 8
SRPM
rhvm-appliance-4.5-20220603.1.el8ev.src.rpm
SHA-256: db89040f095c4903b5ea048c7f0ddf991d1664deb0c05cb91487e3132fe90226
x86_64
rhvm-appliance-4.5-20220603.1.el8ev.x86_64.rpm
SHA-256: a6a248ae1080cece60bbd4fe8d78473b4891e5a3998bfadb5c6a9f4c71b3b846
Red Hat Virtualization Host 4 for RHEL 8
SRPM
rhvm-appliance-4.5-20220603.1.el8ev.src.rpm
SHA-256: db89040f095c4903b5ea048c7f0ddf991d1664deb0c05cb91487e3132fe90226
x86_64
rhvm-appliance-4.5-20220603.1.el8ev.x86_64.rpm
SHA-256: a6a248ae1080cece60bbd4fe8d78473b4891e5a3998bfadb5c6a9f4c71b3b846
The Red Hat security contact is [email protected]. More contact details at https://access.redhat.com/security/team/contact/.
Related news
Progress Chef Infra Server before 15.7 allows a local attacker to exploit a /var/opt/opscode/local-mode-cache/backup world-readable temporary backup path to access sensitive information, resulting in the disclosure of all indexed node data, because OpenSearch credentials are exposed. (The data typically includes credentials for additional systems.) The attacker must wait for an admin to run the "chef-server-ctl reconfigure" command.
Dell Streaming Data Platform prior to 1.4 contains Open Redirect vulnerability. An attacker with privileges same as a legitimate user can phish the legitimate the user to redirect to malicious website leading to information disclosure and launch of phishing attacks.
Gentoo Linux Security Advisory 202211-4 - Multiple vulnerabilities have been found in PostgreSQL, the worst of which could result in remote code execution. Versions greater than or equal to 10.22:10 are affected.
Red Hat Security Advisory 2022-4931-01 - The RHV-M Appliance automates the process of installing and configuring the Red Hat Virtualization Manager. The appliance is available to download as an OVA file from the Customer Portal.
Dell PowerStore, versions prior to 3.0.0.0, contains an OS Command Injection vulnerability in PowerStore T environment. A locally authenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS command on the PowerStore underlying OS. Exploiting may lead to a system take over by an attacker.
A flaw was found in postgresql. A purpose-crafted query can read arbitrary bytes of server memory. In the default configuration, any authenticated database user can complete this attack at will. The attack does not require the ability to create objects. If server settings include max_worker_processes=0, the known versions of this attack are infeasible. However, undiscovered variants of the attack may be independent of that setting.
A flaw was found in PostgreSQL versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. An attacker having permission to create non-temporary objects in at least one schema can execute arbitrary SQL functions under the identity of a superuser. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.