Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2013:0211 - Security Advisory
Issued:
2013-02-04
Updated:
2013-02-04

RHSA-2013:0211 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: rhevm 3.1.2 security and bug fix update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated rhevm packages that fix two security issues and various bugs are
now available.

The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

Description

The Red Hat Enterprise Virtualization Manager is a centralized management
platform that allows system administrators to view and manage virtual
machines. The Red Hat Enterprise Virtualization Manager provides a
comprehensive range of features including search capabilities, resource
management, live migrations, and virtual infrastructure provisioning. The
Manager is a JBoss Application Server application that provides several
interfaces through which the virtual environment can be accessed and
interacted with, including an Administration Portal, a User Portal, and a
Representational State Transfer (REST) Application Programming Interface
(API).

It was discovered that running the domain management tool with the validate
action ("rhevm-manage-domains -action=validate") logged administrative
passwords to a world-readable log file. A local attacker could use this
flaw to gain control of systems that are managed by Red Hat Enterprise
Virtualization Manager. (CVE-2012-6115)

A flaw was found in the way the MoveDisk command checked permissions on the
target storage domain. A privileged user (a storage admin of a storage
domain) could use this flaw to exhaust all available free space in another
storage domain they would otherwise not have access to. (CVE-2013-0168)

The CVE-2012-6115 issue was discovered by Andrew Cathrow of Red Hat. The
CVE-2013-0168 issue was discovered by Ondrej Machacek of Red Hat.

Previously, upgrading from Red Hat Enterprise Virtualization Manager 3.0 to
3.1 was not formally supported by Red Hat. This update fixes a number of
known issues with the upgrade process. As a result, upgrading from Red Hat
Enterprise Virtualization Manager 3.0 to 3.1 is now supported.

For more information on upgrading to Red Hat Enterprise Virtualization
Manager 3.1, consult the Installation Guide:

https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Virtualization/3.1/html/Installation_Guide/chap-Upgrading_to_Red_Hat_Enterprise_Virtualization_3.1.html

Additional tips and considerations to take into account are also available
in the Red Hat Knowledgebase:

https://access.redhat.com/knowledge/articles/269333

Information on the bugs fixed in this update is available in the Technical
Notes document:

https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Virtualization/3.1/html/Technical_Notes/chap-RHSA-2013-0211.html

All Red Hat Enterprise Virtualization Manager administrators are advised to
install these updated packages, which fix these issues.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Virtualization/3.1/html/Installation_Guide/chap-Upgrading_to_Red_Hat_Enterprise_Virtualization_3.1.html

Affected Products

  • Red Hat Virtualization 3.1 x86_64

Fixes

  • BZ - 842134 - [Storage] cannot force extend block storage domains (no force extendVG support)
  • BZ - 854214 - engine: logging - when domain is partially inaccessible event log does not report which luns are inaccessible
  • BZ - 881059 - RESTAPI: RSDL does not document lun-based disks parameters for add()
  • BZ - 881121 - [es_ES] heading "Virtual size" is truncated in Spanish [LAYOUT]
  • BZ - 881783 - ovrit-engine-backend:.rollbackQuota ignores disabled quota
  • BZ - 883893 - [ja_JP] Test case failure: Host Tab [LAYOUT] - "no network assigned" translation doesn't fit a single line
  • BZ - 883896 - [ja_JP] Test case failure: Storage Tab: General sub-tab: unnecessary colon (":") between "Used: xxxxGB" line and NFS Export Path
  • BZ - 883903 - [es_ES] Event Tab, Advance view 's heading Event is truncated [LAYOUT]
  • BZ - 883910 - [ja_JP] Test case failure: Disk Tab: Remove Disk(s) dialog: "[disk-alias] is Bootable and Attached to [n] VM(s)" message structure need to be revised.
  • BZ - 883915 - Portal Login button label is not localized
  • BZ - 883933 - [zh_CN] Truncation column name on logical networks sub tab [LAYOUT]
  • BZ - 886166 - Backend: CPU pinning works only with single-digit CPU's
  • BZ - 886520 - Create ISCSI LUN Disk: Connection details should be mandatory
  • BZ - 886654 - [ja_JP] Test case failure: Check the message for Alert/Events/Tasks: The Date part of the message contains minutes in the month-section.
  • BZ - 887856 - [ja_JP] Test case failure: Virtual Machines [LAYOUT]: New VM dialog -> Resrouce Allocation section -> string "clone" is broken into two lines
  • BZ - 887904 - [rhevm-upgrade] during upgrade rhev-guest-tools-iso is not updated to latest version and remains with old version
  • BZ - 888039 - Failed Hot-Plug and Hot-UnPlug Direct LUN in FC DC environment
  • BZ - 888309 - Importing a VM from an OVF without the diskAlias property with copyCollapse=false will not auto-generate disk aliases
  • BZ - 888317 - [engine] [upgrade] Unable to perform operations as user on existing VM after upgrade from RHEV 3.0 to 3.1
  • BZ - 888785 - [RHEVM Web Admin Portal localization] Zanata source strings (rhevm-3.1 version) containing "oVirt" and "Engine"
  • BZ - 889792 - 'Configure Local Disk' does not work properly in Japanese environment
  • BZ - 891631 - rhevm-upgrade must check for enough disk space to perform an upgrade before starting the upgrade
  • BZ - 893355 - CVE-2013-0168 rhev-m: insufficient MoveDisk target domain permission checks
  • BZ - 902341 - [User Portal] An user with UserRole assigned to a pool does not see pool's VMs
  • BZ - 905865 - CVE-2012-6115 rhev: rhevm-manage-domains logs admin passwords

CVEs

  • CVE-2013-0168
  • CVE-2012-6115

References

  • https://access.redhat.com/security/updates/classification/#moderate
  • https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Virtualization/3.1/html/Installation_Guide/chap-Upgrading_to_Red_Hat_Enterprise_Virtualization_3.1.html
  • https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Virtualization/3.1/html/Technical_Notes/chap-RHSA-2013-0211.html
  • https://access.redhat.com/knowledge/articles/269333
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Virtualization 3.1

SRPM
rhevm-3.1.0-43.el6ev.src.rpm SHA-256: d7ebda31d2de09901851a544dbb652636952b6afb3fa6a088a75399828ae9828
x86_64
rhevm-3.1.0-43.el6ev.noarch.rpm SHA-256: 35a48301a59020bbe8cef6e6aedeae320cf7b938835e9160fcaaaf01871a56e9
rhevm-backend-3.1.0-43.el6ev.noarch.rpm SHA-256: d0a0deac13c49223dd66593a33ada888b7f6a17b0a74fb0f5958d5e9617903cb
rhevm-config-3.1.0-43.el6ev.noarch.rpm SHA-256: 5353106d8eef9fc07769f12a3d2821755b8f362134471ccebcfc2b0c9fd26468
rhevm-dbscripts-3.1.0-43.el6ev.noarch.rpm SHA-256: 797d20884432e119d61c367e2a870761dd4ba27a3170e4189d9f7561a18bd3be
rhevm-genericapi-3.1.0-43.el6ev.noarch.rpm SHA-256: fd2fd3bf5a9408dc0863767aabde18b24bf7236bac587dedb3165b296d3a8ce5
rhevm-notification-service-3.1.0-43.el6ev.noarch.rpm SHA-256: b2069163136ca49031feda76953348eac2b114fb90f76a12312c39858d922b9a
rhevm-restapi-3.1.0-43.el6ev.noarch.rpm SHA-256: e5637adb45a1b67ed93ef1e0e1cba6d20373667a8e6583ac9a4710a77e877d12
rhevm-setup-3.1.0-43.el6ev.noarch.rpm SHA-256: bfc75f89c3b0a48b8d738f52cde0e7323e9ac35ab62e0da4eb15ee225497fcf1
rhevm-setup-plugin-allinone-3.1.0-43.el6ev.noarch.rpm SHA-256: fbf2d2f4eeee63013a984dbb7cf9fc25ba9e3841ff00d245905b2719fe7630be
rhevm-tools-common-3.1.0-43.el6ev.noarch.rpm SHA-256: 03d12bce1bf57a4d29218b53dade8909c166bca616b51e68d6b06b28081b3d9e
rhevm-userportal-3.1.0-43.el6ev.noarch.rpm SHA-256: 65d37c37d5b07c0c0b32b3b8083157472ee67147328fd2896c3419fdafc811f3
rhevm-webadmin-portal-3.1.0-43.el6ev.noarch.rpm SHA-256: c8b9c752e39943692d3207d58eb35c2385dd0c8e14b2362c715d46cb2d21f749

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility