- Issued:
- 2021-04-14
- Updated:
- 2021-04-14
RHSA-2021:1186 - Security Advisory
Synopsis
Moderate: RHV Manager (ovirt-engine) 4.4.z [ovirt-4.4.5] 0-day security, bug fix, enhance
Type/Severity
Security Advisory: Moderate
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update for org.ovirt.engine-root, ovirt-engine-ui-extensions, and ovirt-web-ui is now available for Red Hat Virtualization Engine 4.4.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The ovirt-engine package provides the manager for virtualization environments.
This manager enables admins to define hosts and networks, as well as to add
storage, create VMs and manage user permissions.
Bug Fix(es):
- Previously, saving user preferences in the Red Hat Virtualization Manager required the MANIPULATE_USERS permission level. As a result, user preferences were not saved on the server.
In this release, the required permission level for saving user preferences was changed to EDIT_PROFILE, which is the permission level assigned by default to all users. As a result, saving user preferences works as expected. (BZ#1920539)
A list of bugs fixed in this update is available in the Technical Notes
book:
https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html-single/technical_notes
Security Fix(es):
- nodejs-bootstrap-select: not escaping title values on <option> may lead to XSS (CVE-2019-20921)
- datatables.net: prototype pollution if 'constructor' were used in a data property name (CVE-2020-28458)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
Affected Products
- Red Hat Virtualization Manager 4.4 x86_64
Fixes
- BZ - 1171924 - [RFE] User Preferences / settings dialog with server-side storage
- BZ - 1750426 - [RFE] No clear/consistent indication that Upgrade Cluster is underway
- BZ - 1795457 - RHV-M causing high load on PostgreSQL DB after upgrade to 4.2
- BZ - 1882273 - CVE-2019-20921 nodejs-bootstrap-select: not escaping title values on <option> may lead to XSS
- BZ - 1908441 - CVE-2020-28458 datatables.net: prototype pollution if 'constructor' were used in a data property name
- BZ - 1920539 - Error screen displayed after user login in admin portal.
Red Hat Virtualization Manager 4.4
SRPM | |
---|---|
ovirt-engine-4.4.5.11-0.1.el8ev.src.rpm | SHA-256: 04d6a1b6f1a516bc8ad885006420b4162365859aa70796bd79c75f9499d5e5fc |
ovirt-engine-ui-extensions-1.2.5-1.el8ev.src.rpm | SHA-256: 24d7f898c67b5da1ddc8fcb89642ab797352c4d9be707adc9e394a84bdfe4989 |
ovirt-web-ui-1.6.8-1.el8ev.src.rpm | SHA-256: c8f456a62b9d8c10b0585683424341e910dfc41ab6912b8c63eec3d747c943ef |
x86_64 | |
ovirt-engine-4.4.5.11-0.1.el8ev.noarch.rpm | SHA-256: 2b4fa8c12ca990987999fb6ffed3eae59462c4b610e7d5d08bab8417256410f7 |
ovirt-engine-backend-4.4.5.11-0.1.el8ev.noarch.rpm | SHA-256: 1dd56d65da4cee6b028dbadae10acad651ec1015c8627ea5ae321272a86000d2 |
ovirt-engine-dbscripts-4.4.5.11-0.1.el8ev.noarch.rpm | SHA-256: d28acd05017b1be0e6725d7b85f13c73f88a52d5f8b2ddeddeda9eec03c11701 |
ovirt-engine-health-check-bundler-4.4.5.11-0.1.el8ev.noarch.rpm | SHA-256: bd44e8cb30e9762865967d788c431c119d2178d51d2f70647f875c1bbd6e3f85 |
ovirt-engine-restapi-4.4.5.11-0.1.el8ev.noarch.rpm | SHA-256: ca68ee49ff51642dd28f3eb5fbc69551099d65805a175eea077291932d49c780 |
ovirt-engine-setup-4.4.5.11-0.1.el8ev.noarch.rpm | SHA-256: d80a8e47a35c960a25f671c57354ecd69c3426ae8c1f65ea5a55abc2523d01ce |
ovirt-engine-setup-base-4.4.5.11-0.1.el8ev.noarch.rpm | SHA-256: a8f24c8ce9e5555b20ee1d3ffde8c847c2894cf68282f532ad7408f1c93e9388 |
ovirt-engine-setup-plugin-cinderlib-4.4.5.11-0.1.el8ev.noarch.rpm | SHA-256: 88bf094284e320baf094303be872193acc71547432354ffa81439a82f39616a7 |
ovirt-engine-setup-plugin-imageio-4.4.5.11-0.1.el8ev.noarch.rpm | SHA-256: 6e1c2b3301eb2f26bf8e9b47a339aada76b8d0a45f1d33ec20d03efb40bc903e |
ovirt-engine-setup-plugin-ovirt-engine-4.4.5.11-0.1.el8ev.noarch.rpm | SHA-256: d8a52ce15743d608ec953c2bd8a07cbcaf7e9073751133e66789c9678311e1f0 |
ovirt-engine-setup-plugin-ovirt-engine-common-4.4.5.11-0.1.el8ev.noarch.rpm | SHA-256: fc3470502903218e2a6f8c442920b04e0d2d8233bde3dde6a8c19dbeb3b6d8df |
ovirt-engine-setup-plugin-vmconsole-proxy-helper-4.4.5.11-0.1.el8ev.noarch.rpm | SHA-256: e37c8f38e31a2b8dd6ecc787bb37bc9080ee0e59e5a7b89868b9c745be80ce0a |
ovirt-engine-setup-plugin-websocket-proxy-4.4.5.11-0.1.el8ev.noarch.rpm | SHA-256: 9c01d36e979bd7b13b2b9f4367b0d0cba64b8749c1c422f5e8803d5bb5c1159f |
ovirt-engine-tools-4.4.5.11-0.1.el8ev.noarch.rpm | SHA-256: d8df29148d998f6d5f72f321a717e3f07563f8a209bf27bd12fff46b6ace1f0d |
ovirt-engine-tools-backup-4.4.5.11-0.1.el8ev.noarch.rpm | SHA-256: ddf72b8cafc9c6168dfb79e4c1f6c3a5f6b921449763c9fe18270258bbe42d78 |
ovirt-engine-ui-extensions-1.2.5-1.el8ev.noarch.rpm | SHA-256: f96e2fa930f27fe54dadb07138490ed5156297fbddce4872dde5290b9baafe33 |
ovirt-engine-vmconsole-proxy-helper-4.4.5.11-0.1.el8ev.noarch.rpm | SHA-256: e8ba906b147011535d2dcc6686e7c6fb46fe815737a8210dbf7a60e2c01e565b |
ovirt-engine-webadmin-portal-4.4.5.11-0.1.el8ev.noarch.rpm | SHA-256: 67736a846c2ec4d92f950253afa91fe326eb228f52a97f1bc4d8158567a4f5d1 |
ovirt-engine-websocket-proxy-4.4.5.11-0.1.el8ev.noarch.rpm | SHA-256: a43efc5ff662dd8e99161b7e3f758fc5f84f58369765e9b759de2ebe9ab7d996 |
ovirt-web-ui-1.6.8-1.el8ev.noarch.rpm | SHA-256: fe708479e690d2fc2040ac3a446c8a4ca2da9f9f2199fea03f60fbf1c9b1f96a |
python3-ovirt-engine-lib-4.4.5.11-0.1.el8ev.noarch.rpm | SHA-256: 824358c492b7ee9cd6a04d1d4b15d8ae232f25cb319c72108fcc43f4d19bfafb |
rhvm-4.4.5.11-0.1.el8ev.noarch.rpm | SHA-256: db3364df3509f071cca636302eb11b8c412f43b3c17532e0279900677ff56903 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.