Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2022:4931: Red Hat Security Advisory: RHV Appliance (rhvm-appliance) security update [ovirt-4.5.0]

Updated RHV-M Appliance packages that fix several bugs and add various enhancements are now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2021-3677: postgresql: memory disclosure in certain queries
Red Hat Security Data
#sql#vulnerability#web#linux#red_hat#nodejs#js#java#kubernetes#aws#auth#ssh#rpm#postgres#ssl

Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager

All Products

Issued:

2022-06-07

Updated:

2022-06-07

RHSA-2022:4931 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: RHV Appliance (rhvm-appliance) security update [ovirt-4.5.0]

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated RHV-M Appliance packages that fix several bugs and add various enhancements are now available.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The RHV-M Appliance automates the process of installing and configuring the Red Hat Virtualization Manager. The appliance is available to download as an OVA file from the Customer Portal.

Security Fix(es):

  • postgresql: memory disclosure in certain queries (CVE-2021-3677)

For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • RHV-M Appliance rebased on RHEL 8.6 (BZ#1997073)
  • Previously, a self-hosted engine deployment failed when an OpenSCAP security profile was applied, resulting in the SSH key permissions being changed to 0640. In this release, the permissions are not changed and the deployment succeeds. (BZ#2011309)
  • rng-tools, rsyslog-gnutls, usbguard packages added to the RHV-M Appliance to comply with DISA-STIG profile requirements (BZ#2070963)
  • OVA package manifest added to the RHV-M Appliance RPM. (BZ#2070980)
  • Previously, the nodejs package was downgraded during the RHV-M installation.

In this release, the correct version of the nodejs package is installed and maintained. (BZ#2075852)

  • RHV-M Appliance rebased on Ceph 4.3 (BZ#2090137)

Affected Products

  • Red Hat Virtualization 4 for RHEL 8 x86_64
  • Red Hat Virtualization Host 4 for RHEL 8 x86_64

Fixes

  • BZ - 1958396 - RHV installation process downgrades some packages
  • BZ - 1997073 - Rebase RHV-M Appliance on RHEL 8.6.0
  • BZ - 2001857 - CVE-2021-3677 postgresql: memory disclosure in certain queries
  • BZ - 2011309 - sshd service fails to start after rebooting to apply FIPS settings
  • BZ - 2050071 - Use authselect in RHV-H and appliance images
  • BZ - 2056146 - Hosted engine deployed failed since no enabled repositories can be found for engine setup.
  • BZ - 2070963 - Include packages needed by DISA STIG
  • BZ - 2070980 - [RFE] Include a manifest in the rpm
  • BZ - 2073965 - [Hosted Engine]Error message “Destination directory /etc/fapolicyd/rules.d does not exist” is displayed but it is existed
  • BZ - 2075852 - nodejs module not enabled causes nodejs downgrade to version 10
  • BZ - 2090137 - Rebase rhvm-appliance on ceph 4.3

Red Hat Virtualization 4 for RHEL 8

SRPM

rhvm-appliance-4.5-20220603.1.el8ev.src.rpm

SHA-256: db89040f095c4903b5ea048c7f0ddf991d1664deb0c05cb91487e3132fe90226

x86_64

rhvm-appliance-4.5-20220603.1.el8ev.x86_64.rpm

SHA-256: a6a248ae1080cece60bbd4fe8d78473b4891e5a3998bfadb5c6a9f4c71b3b846

Red Hat Virtualization Host 4 for RHEL 8

SRPM

rhvm-appliance-4.5-20220603.1.el8ev.src.rpm

SHA-256: db89040f095c4903b5ea048c7f0ddf991d1664deb0c05cb91487e3132fe90226

x86_64

rhvm-appliance-4.5-20220603.1.el8ev.x86_64.rpm

SHA-256: a6a248ae1080cece60bbd4fe8d78473b4891e5a3998bfadb5c6a9f4c71b3b846

The Red Hat security contact is [email protected]. More contact details at https://access.redhat.com/security/team/contact/.

Related news

CVE-2023-28864: Chef Infra Server Release Notes

Progress Chef Infra Server before 15.7 allows a local attacker to exploit a /var/opt/opscode/local-mode-cache/backup world-readable temporary backup path to access sensitive information, resulting in the disclosure of all indexed node data, because OpenSearch credentials are exposed. (The data typically includes credentials for additional systems.) The attacker must wait for an admin to run the "chef-server-ctl reconfigure" command.

CVE-2023-28069: DSA-2022-258: Dell Streaming Data Platform Security Update for Multiple Third-Party Component Vulnerabilities

Dell Streaming Data Platform prior to 1.4 contains Open Redirect vulnerability. An attacker with privileges same as a legitimate user can phish the legitimate the user to redirect to malicious website leading to information disclosure and launch of phishing attacks.

Gentoo Linux Security Advisory 202211-04

Gentoo Linux Security Advisory 202211-4 - Multiple vulnerabilities have been found in PostgreSQL, the worst of which could result in remote code execution. Versions greater than or equal to 10.22:10 are affected.

Red Hat Security Advisory 2022-4931-01

Red Hat Security Advisory 2022-4931-01 - The RHV-M Appliance automates the process of installing and configuring the Red Hat Virtualization Manager. The appliance is available to download as an OVA file from the Customer Portal.

CVE-2022-33923: DSA-2022-159: Dell PowerStore Family Security Update for Multiple Vulnerabilities

Dell PowerStore, versions prior to 3.0.0.0, contains an OS Command Injection vulnerability in PowerStore T environment. A locally authenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS command on the PowerStore underlying OS. Exploiting may lead to a system take over by an attacker.

CVE-2021-3677: Invalid Bug ID

A flaw was found in postgresql. A purpose-crafted query can read arbitrary bytes of server memory. In the default configuration, any authenticated database user can complete this attack at will. The attack does not require the ability to create objects. If server settings include max_worker_processes=0, the known versions of this attack are infeasible. However, undiscovered variants of the attack may be independent of that setting.

CVE-2020-25695: PostgreSQL: Security Information

A flaw was found in PostgreSQL versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. An attacker having permission to create non-temporary objects in at least one schema can execute arbitrary SQL functions under the identity of a superuser. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.