- Issued:
- 2022-09-08
- Updated:
- 2022-09-08
RHSA-2022:6393 - Security Advisory
Synopsis
Important: RHV Manager (ovirt-engine) [ovirt-4.5.2] bug fix and security update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated ovirt-engine packages that fix several bugs and add various enhancements are now available.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The ovirt-engine package provides the Red Hat Virtualization Manager, a centralized management platform that allows system administrators to view and manage virtual machines. The Manager provides a comprehensive range of features including search capabilities, resource management, live migrations, and virtual infrastructure provisioning.
Security Fix(es):
- nodejs-underscore: Arbitrary code execution via the template function (CVE-2021-23358)
- moment: inefficient parsing algorithm resulting in DoS (CVE-2022-31129)
- jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method (CVE-2020-11022)
- jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods (CVE-2020-11023)
- ovirt-log-collector: RHVM admin password is logged unfiltered (CVE-2022-2806)
- springframework: malicious input leads to insertion of additional log entries (CVE-2021-22096)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- Previously, running engine-setup did not always renew OVN certificates close to expiration or expired. With this release, OVN certificates are always renewed by engine-setup when needed. (BZ#2097558)
- Previously, the Manager issued warnings of approaching certificate expiration before engine-setup could update certificates. In this release expiration warnings and certificate update periods are aligned, and certificates are updated as soon as expiration warnings occur. (BZ#2097725)
- With this release, OVA export or import work on hosts with a non-standard SSH port. (BZ#2104939)
- With this release, the certificate validity test is compatible with RHEL 8 and RHEL 7 based hypervisors. (BZ#2107250)
- RHV 4.4 SP1 and later are only supported on RHEL 8.6, customers cannot use RHEL 8.7 or later, and must stay with RHEL 8.6 EUS. (BZ#2108985)
- Previously, importing templates from the Administration Portal did not work. With this release, importing templates from the Administration Portal is possible. (BZ#2109923)
- ovirt-provider-ovn certificate expiration is checked along with other RHV certificates. If ovirt-provider-ovn is about to expire or already expired, a warning or alert is raised in the audit log. To renew the ovirt-provider-ovn certificate, administators must run engine-setup. If your ovirt-provider-ovn certificate expires on a previous RHV version, upgrade to RHV 4.4 SP1 batch 2 or later, and ovirt-provider-ovn certificate will be renewed automatically in the engine-setup. (BZ#2097560)
- Previously, when importing a virtual machine with manual CPU pinning, the manual pinning string was cleared, but the CPU pinning policy was not set to NONE. As a result, importing failed. In this release, the CPU pinning policy is set to NONE if the CPU pinning string is cleared, and importing succeeds. (BZ#2104115)
- Previously, the Manager could start a virtual machine with a Resize and Pin NUMA policy on a host without an equal number of physical sockets to NUMA nodes. As a result, wrong pinning was assigned to the policy. With this release, the Manager does not allow the virtual machine to be scheduled on such a virtual machine, and the pinning is correct based on the algorithm. (BZ#1955388)
- Rebase package(s) to version: 4.4.7.
Highlights, important fixes, or notable enhancements: fixed BZ#2081676 (BZ#2104831)
- In this release, rhv-log-collector-analyzer provides detailed output for each problematic image, including disk names, associated virtual machine, the host running the virtual machine, snapshots, and current SPM. The detailed view is now the default. The compact option can be set by using the --compact switch in the command line. (BZ#2097536)
- UnboundID LDAP SDK has been rebased on upstream version 6.0.4. See https://github.com/pingidentity/ldapsdk/releases for changes since version 4.0.14 (BZ#2092478)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
Affected Products
- Red Hat Virtualization Manager 4.4 x86_64
Fixes
- BZ - 1828406 - CVE-2020-11022 jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method
- BZ - 1850004 - CVE-2020-11023 jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods
- BZ - 1939284 - clusterPolicyWeightFunctionInfo tooltip needs improvement in relation to Rank Selector policy unit.
- BZ - 1944286 - CVE-2021-23358 nodejs-underscore: Arbitrary code execution via the template function
- BZ - 1955388 - Auto Pinning Policy only pins some of the vCPUs on a single NUMA host
- BZ - 1974974 - Not possible to determine migration policy from the API, even though documentation reports that it can be done.
- BZ - 2034584 - CVE-2021-22096 springframework: malicious input leads to insertion of additional log entries
- BZ - 2080005 - CVE-2022-2806 ovirt-log-collector: RHVM admin password is logged unfiltered
- BZ - 2092478 - Upgrade unboundid-ldapsdk to 6.0.4
- BZ - 2094577 - rhv-image-discrepancies must ignore small disks created by OCP
- BZ - 2097536 - [RFE] Add disk name and uuid to problems output
- BZ - 2097558 - Renew ovirt-provider-ovn.cer certificates during engine-setup
- BZ - 2097560 - Warning when ovsdb-server certificates are about to expire(OVN certificate)
- BZ - 2097725 - Certificate Warn period and automatic renewal via engine-setup do not match
- BZ - 2104115 - RHV 4.5 cannot import VMs with cpu pinning
- BZ - 2104831 - Upgrade ovirt-log-collector to 4.4.7
- BZ - 2104939 - Export OVA when using host with port other than 22
- BZ - 2105075 - CVE-2022-31129 moment: inefficient parsing algorithm resulting in DoS
- BZ - 2107250 - Upgrade of the host failed as the RHV 4.3 hypervisor is based on RHEL 7 with openssl 1.0.z, but RHV Manager 4.4 uses the openssl 1.1.z syntax
- BZ - 2107267 - ovirt-log-collector doesn't generate database dump
- BZ - 2108985 - RHV 4.4 SP1 EUS requires RHEL 8.6 EUS (RHEL 8.7+ releases are not supported on RHV 4.4 SP1 EUS)
- BZ - 2109923 - Error when importing templates in Admin portal
Red Hat Virtualization Manager 4.4
SRPM | |
---|---|
ovirt-engine-4.5.2.4-0.1.el8ev.src.rpm | SHA-256: 3aa02740ea80e0adf8afe3b4aabc9253ec4a99f2d9078b487f6fa9f7ca42778f |
ovirt-engine-dwh-4.5.4-1.el8ev.src.rpm | SHA-256: 00053260a2a031f25ba76dfd3a09429ffdc86a051a9d86499a9c7147d6f68716 |
ovirt-engine-extension-aaa-ldap-1.4.6-1.el8ev.src.rpm | SHA-256: ca91281820deb418d8c44cda65a1b5b93c66e129af7f3da031680ca56c680ec1 |
ovirt-engine-ui-extensions-1.3.5-1.el8ev.src.rpm | SHA-256: d41495c805b6e51433b24ab920a36309df7e80de818be93313fa3105bcfe0fe7 |
ovirt-log-collector-4.4.7-2.el8ev.src.rpm | SHA-256: 0a1b8ee9d2fa0878562e30019730e3adadda85bcad78bcb0f54149755eb245fb |
ovirt-web-ui-1.9.1-1.el8ev.src.rpm | SHA-256: cfc278e34687b64cc76e4e5097542697a013c04eebd95d1134652596ddd8b63a |
rhv-log-collector-analyzer-1.0.15-1.el8ev.src.rpm | SHA-256: 9c118ad506a5aeba9e9a8ccbaf7f640e33e9fdd9138af732871d1e9875c1f00a |
unboundid-ldapsdk-6.0.4-1.el8ev.src.rpm | SHA-256: 6c3a6ccf67309593497f81ef93c807994ece107ed6a7fa85ed57c1cbc1ab69be |
vdsm-jsonrpc-java-1.7.2-1.el8ev.src.rpm | SHA-256: 48fc74bf7cfc6a2f5936c3205342c545a706ed17fbb2093b81da8df0c240da07 |
x86_64 | |
ovirt-engine-4.5.2.4-0.1.el8ev.noarch.rpm | SHA-256: e75c3e85af57616555d9771eee2f17faea8ede9ffac6a7e4c7ae13c195e60089 |
ovirt-engine-backend-4.5.2.4-0.1.el8ev.noarch.rpm | SHA-256: f6b3f59d9ee407b92443673a3e7deb8b132afefaa148b805ab2701230eb8be0f |
ovirt-engine-dbscripts-4.5.2.4-0.1.el8ev.noarch.rpm | SHA-256: e0cb1f92ca1ead4b5506d5eebddc29f7371131f86cdb632ec68d0998f23a5e0a |
ovirt-engine-dwh-4.5.4-1.el8ev.noarch.rpm | SHA-256: 4e392caee5a92df278d3e2ff001bf1d5324a9188e36b4af73b18de2e9e371067 |
ovirt-engine-dwh-grafana-integration-setup-4.5.4-1.el8ev.noarch.rpm | SHA-256: 36bbfcf2a0bb082a8b66e2feed1d23a5930cd9339d8b1b49797c3788a43d36ba |
ovirt-engine-dwh-setup-4.5.4-1.el8ev.noarch.rpm | SHA-256: 8ea2a417f77f3d3a21a8ec90cdec43dc79ef8616f9d2f1cf022be53780903ff1 |
ovirt-engine-extension-aaa-ldap-1.4.6-1.el8ev.noarch.rpm | SHA-256: d00a451f6f38fa28fd1fea021f6e17dcd1f5d07a77caad5379e0a5380b9028b7 |
ovirt-engine-extension-aaa-ldap-setup-1.4.6-1.el8ev.noarch.rpm | SHA-256: 2300d58698bd06f9e62189c0d22b3ea48047d0a80e0bb2aba31793e7ff50be3c |
ovirt-engine-health-check-bundler-4.5.2.4-0.1.el8ev.noarch.rpm | SHA-256: 1e8cefb9b586c3a7f6a1e15f4b0fb4a4e08450fbb6ff5108dc52745808750911 |
ovirt-engine-restapi-4.5.2.4-0.1.el8ev.noarch.rpm | SHA-256: 4eff5fc8bc4c80040168305aca703f2b90e6024b71d89052b9c481ba411fb97d |
ovirt-engine-setup-4.5.2.4-0.1.el8ev.noarch.rpm | SHA-256: 2bd9c9d182c308879c9b17527def0971728b1d18230af8a25f36f6e1f2891a06 |
ovirt-engine-setup-base-4.5.2.4-0.1.el8ev.noarch.rpm | SHA-256: 793d0bd354a08dbabc53f56ed304af745e3f793da7ec0b85f20d7190f29beb17 |
ovirt-engine-setup-plugin-cinderlib-4.5.2.4-0.1.el8ev.noarch.rpm | SHA-256: 8bb08134374514996f908b6d84bb07e7be77ea4bcbcda06040b2aae6c7a04a1f |
ovirt-engine-setup-plugin-imageio-4.5.2.4-0.1.el8ev.noarch.rpm | SHA-256: d9b1f74bad7bf9ead26dcabbefc76ebce6594b58575202aefef0b80eedf7d6ed |
ovirt-engine-setup-plugin-ovirt-engine-4.5.2.4-0.1.el8ev.noarch.rpm | SHA-256: 2b893c2dabaac50a8f134b003ead5a7b0a614a741e046d3f2b61ef5a793c8bf2 |
ovirt-engine-setup-plugin-ovirt-engine-common-4.5.2.4-0.1.el8ev.noarch.rpm | SHA-256: ac4384d8c863cb8815bda00fcd1703b6d01d3b982b52775f0407e659fb817466 |
ovirt-engine-setup-plugin-vmconsole-proxy-helper-4.5.2.4-0.1.el8ev.noarch.rpm | SHA-256: 3b01adfcfbf2058ff3e8eb34652caf926332a4a3852d9fc894a599648a066060 |
ovirt-engine-setup-plugin-websocket-proxy-4.5.2.4-0.1.el8ev.noarch.rpm | SHA-256: 562b007806ad4849fbc5e77d8381f1d646114e597fb4e0921db4fc8b8d5a2801 |
ovirt-engine-tools-4.5.2.4-0.1.el8ev.noarch.rpm | SHA-256: fa28948791917d1333b1da23dffac8d227cd6e84c234b135026ea6a0120af46d |
ovirt-engine-tools-backup-4.5.2.4-0.1.el8ev.noarch.rpm | SHA-256: 56d2e4a9090588cfd7195185b9804df98aaf91533b84cbf9e3d534fb5b0c5dd0 |
ovirt-engine-ui-extensions-1.3.5-1.el8ev.noarch.rpm | SHA-256: 17876587c660c5202d49726bf20bfcca394095671b34aa43ab51a3cfd22a0959 |
ovirt-engine-vmconsole-proxy-helper-4.5.2.4-0.1.el8ev.noarch.rpm | SHA-256: 17890b7f3d0091c128225ea10f456d682997983d049d898829a772266caf06a9 |
ovirt-engine-webadmin-portal-4.5.2.4-0.1.el8ev.noarch.rpm | SHA-256: dcc6d07b03a6702fb3affa52376ca84c7b9e06494542bff33020941912b6ebc9 |
ovirt-engine-websocket-proxy-4.5.2.4-0.1.el8ev.noarch.rpm | SHA-256: 791a54f37c8542e540245438edc3bef00c014e9fa216c87ef7fc54269fc15bbf |
ovirt-log-collector-4.4.7-2.el8ev.noarch.rpm | SHA-256: 6325fb4e7caccf7b456f77224c277fa946d5b97814a62d9db195411916e9e89f |
ovirt-web-ui-1.9.1-1.el8ev.noarch.rpm | SHA-256: 7bc6a019fd9dfe4fce40f22ff431d7e5680f7ea43688cb7d1410b53e7c91b5bd |
python3-ovirt-engine-lib-4.5.2.4-0.1.el8ev.noarch.rpm | SHA-256: 31a00f978279584850e43fb9a4c9efdb19085d5a7a316543875eabaa9b2ea9ea |
rhv-log-collector-analyzer-1.0.15-1.el8ev.noarch.rpm | SHA-256: c9940c50f9f206c12faf54c7db696f53b96269a9d0de4b34261b477347965390 |
rhvm-4.5.2.4-0.1.el8ev.noarch.rpm | SHA-256: 1fa5979b82b3911ad6b88dbfeda23a35d91dfafa9e59fdb3b3f2b47acd39a540 |
unboundid-ldapsdk-6.0.4-1.el8ev.noarch.rpm | SHA-256: 89cd09bc574f2a7ec26162eedc6c966506d4d71f0001b54f7b150fea75657356 |
unboundid-ldapsdk-javadoc-6.0.4-1.el8ev.noarch.rpm | SHA-256: 5c93a115a220f99c7c8b64e8859d42c9def7483a469522e139014bb5ce4d9b8d |
vdsm-jsonrpc-java-1.7.2-1.el8ev.noarch.rpm | SHA-256: ff74934e243d518e5f3664548c9b8e51a2561ae0dd7d0b14940fc54b94445cb5 |
vdsm-jsonrpc-java-javadoc-1.7.2-1.el8ev.noarch.rpm | SHA-256: 19da67798965d178d1599386a498c8ce3bc3462ce01ff126dc836b65acfc3829 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.