- Issued:
- 2023-01-11
- Updated:
- 2023-01-11
RHSA-2023:0074 - Security Advisory
Synopsis
Important: RHV 4.4 SP1 [ovirt-4.5.3-3] security update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated RHV packages that fix several bugs and add various enhancements are now available.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The ovirt-engine package provides the Red Hat Virtualization Manager, a centralized management platform that allows system administrators to view and manage virtual machines. The Manager provides a comprehensive range of features including search capabilities, resource management, live migrations, and virtual infrastructure provisioning.
Security fix(es):
- mina-sshd: Java unsafe deserialization vulnerability (CVE-2022-45047)
- isomorphic-git: Directory traversal via a crafted repository (CVE-2021-30483)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- With this release, SELinux rules for the Grafana HTTP port are now properly set up for new remote DWH installations as part of the Red Hat Virtualization Manager engine-setup. (BZ#2126778)
- Previously, search conditions were not applied properly when a non-admin user tried to search for Clusters or Data Centers over the REST API. In this release, both admin and non-admin users can search for clusters properly using the REST API. (BZ#2144346)
- Previously, stale bitmaps in the base image during a cold or live internal merge caused the operation to fail. In this release, the merge operation succeeds. (BZ#2141371)
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Virtualization Manager 4.4 x86_64
- Red Hat Virtualization 4 for RHEL 8 x86_64
- Red Hat Virtualization Host 4 for RHEL 8 x86_64
- Red Hat Virtualization for IBM Power LE 4 for RHEL 8 ppc64le
Fixes
- BZ - 1988539 - CVE-2021-30483 isomorphic-git: Directory traversal via a crafted repository
- BZ - 2126778 - Port 3000 blocked between engine and remote DWH with Grafana
- BZ - 2141371 - Incorrect image chain when deleting an intermediate snapshot
- BZ - 2144346 - Search returns all entities the permissions allow if the user is not admin
- BZ - 2145194 - CVE-2022-45047 mina-sshd: Java unsafe deserialization vulnerability
- BZ - 2152015 - Discrepancy tool fails with KeyError
- BZ - 2152845 - Storage stabilization for 4.5.3
Red Hat Virtualization Manager 4.4
SRPM | |
---|---|
apache-sshd-2.9.2-0.1.el8ev.src.rpm | SHA-256: aa2380792a2f8320ce681ea458209b028bde77b6d44d538bc61b08c6c185d9c1 |
ovirt-engine-4.5.3.5-1.el8ev.src.rpm | SHA-256: 4d1b398ba06a3d76a86374b18c79ca8918c2123a8847aecbca94cb57cc47e50a |
ovirt-engine-ui-extensions-1.3.7-1.el8ev.src.rpm | SHA-256: fca95c401ab5b37535550ebddec739b70ee6d15ea91579703c79486e3c021c82 |
ovirt-web-ui-1.9.3-1.el8ev.src.rpm | SHA-256: 0c81821eae73fba1f04a1fc0ac62c82f8724e56c895396f3c513ac7a4151cdf6 |
rhv-log-collector-analyzer-1.0.16-1.el8ev.src.rpm | SHA-256: ec684718bffd6a4c8d4a2a3bac0ee662bf0d511aae54003f91655eba353de40f |
x86_64 | |
apache-sshd-2.9.2-0.1.el8ev.noarch.rpm | SHA-256: 112d5c1b9f589310ef57c1f56bf258b35f57bc630d7fa049b5a8db3bdf97fc12 |
apache-sshd-javadoc-2.9.2-0.1.el8ev.noarch.rpm | SHA-256: ec64f18865c71f63fb1cd1a93a1fb597011b62370eac61c90df4cea54caa7fc3 |
ovirt-engine-4.5.3.5-1.el8ev.noarch.rpm | SHA-256: 266b261f86928178fa508e48a00046066f0a0799b4db02e43957036456f38798 |
ovirt-engine-backend-4.5.3.5-1.el8ev.noarch.rpm | SHA-256: 1b28586aacd240eef958aec1447382512093cdb97324840e9010b8c430580a5b |
ovirt-engine-dbscripts-4.5.3.5-1.el8ev.noarch.rpm | SHA-256: 98ab530ee64884f9a82ccf472577ec47784789b6af49e6de37ccbcd110b9b155 |
ovirt-engine-health-check-bundler-4.5.3.5-1.el8ev.noarch.rpm | SHA-256: c12290a0b8b0e6baa7e7ce8f93f7eb946556f4a0a80367f0d6c0deef71b4bf72 |
ovirt-engine-restapi-4.5.3.5-1.el8ev.noarch.rpm | SHA-256: 449b0f296505898f802ef23bbae23597625acc34ea200ac87019b48cda5c1063 |
ovirt-engine-setup-4.5.3.5-1.el8ev.noarch.rpm | SHA-256: 04af43d11ce51bb427ad121e856a0ae101fa4762bd2e15670bba7e491d3c2448 |
ovirt-engine-setup-base-4.5.3.5-1.el8ev.noarch.rpm | SHA-256: 686792a6557cf8a8f0a380564d4ade4d8059a866049cc552ff0f4b61a931b7b9 |
ovirt-engine-setup-plugin-cinderlib-4.5.3.5-1.el8ev.noarch.rpm | SHA-256: 4113c752f08d7e5fb1d200746f6232ea7a156188d0fe10ae01927fd571d93084 |
ovirt-engine-setup-plugin-imageio-4.5.3.5-1.el8ev.noarch.rpm | SHA-256: 657d05dc8a3eb8b65c21c89f0fb7ccf93d039e3842860a6fc30dc977b42b1180 |
ovirt-engine-setup-plugin-ovirt-engine-4.5.3.5-1.el8ev.noarch.rpm | SHA-256: c18d6aa3a2d75b1be64cadacb93d5311c30ed43ccc728cf489df3201edc13674 |
ovirt-engine-setup-plugin-ovirt-engine-common-4.5.3.5-1.el8ev.noarch.rpm | SHA-256: b8cafd05be13d94f6f40ec1c9493e05933ef6905dc99b65e3fe1884cfb522828 |
ovirt-engine-setup-plugin-vmconsole-proxy-helper-4.5.3.5-1.el8ev.noarch.rpm | SHA-256: 7d937b923ed02a8f6270c80403c8ea1e8bc15b1741c9702c01972829c944e430 |
ovirt-engine-setup-plugin-websocket-proxy-4.5.3.5-1.el8ev.noarch.rpm | SHA-256: ae5f2e4ada944456c3ecd76d2fbfb9eb8572e32d1ac9ec96bf631ba199e0bcef |
ovirt-engine-tools-4.5.3.5-1.el8ev.noarch.rpm | SHA-256: 579c08c5b8c27a0d2b956aeeb36e2da79067315ea2bea35c366450be71f534ab |
ovirt-engine-tools-backup-4.5.3.5-1.el8ev.noarch.rpm | SHA-256: 1d764678cf22e74ac85a3b90dad3cd781b5ffdace8ba60d65bc19a2ada5a12e8 |
ovirt-engine-ui-extensions-1.3.7-1.el8ev.noarch.rpm | SHA-256: 67fc6608896dd08809e84ec6ba1057cdfbc8fe7a75ca27054e30ecd16cdaa540 |
ovirt-engine-vmconsole-proxy-helper-4.5.3.5-1.el8ev.noarch.rpm | SHA-256: c64e50ce379dfcdef7e2bec4686ee63429036db26a3d7f323e2f8baaf382f9c8 |
ovirt-engine-webadmin-portal-4.5.3.5-1.el8ev.noarch.rpm | SHA-256: f570769694732dde6543ffef1c5a898b3ee6ce020ea6e12e085a6d23ecc76d11 |
ovirt-engine-websocket-proxy-4.5.3.5-1.el8ev.noarch.rpm | SHA-256: ea30f613529fba270158c0da6a175c53aebca1e02fb07b22935c24297608a300 |
ovirt-web-ui-1.9.3-1.el8ev.noarch.rpm | SHA-256: 205c05d259b44b9d1d9fa9d1081d5b884ecbf8d08a68a272c849619681606c99 |
python3-ovirt-engine-lib-4.5.3.5-1.el8ev.noarch.rpm | SHA-256: a9958edc7370d9d7a775cd27a1e25c05b04a5200d6ddfd85f147aa28cec8184d |
rhv-log-collector-analyzer-1.0.16-1.el8ev.noarch.rpm | SHA-256: 250436893823974490d10a18060ccac482f1fa2d203bf7e4eb5b502efcfe6ce3 |
rhvm-4.5.3.5-1.el8ev.noarch.rpm | SHA-256: 9154ebb602b591eae73fe5b10b486df88488a476a0241b45f9239e3892c09d1e |
Red Hat Virtualization 4 for RHEL 8
SRPM | |
---|---|
vdsm-4.50.3.6-1.el8ev.src.rpm | SHA-256: 966d0af029ea034bd4ff0322320df28ceb1c1c262fb3c97f3ca08b4d45e51a81 |
x86_64 | |
vdsm-4.50.3.6-1.el8ev.x86_64.rpm | SHA-256: 09944215fafb8bfb69c5559502fc4fc7355d927a274899dfb6cc26001b249cd2 |
vdsm-api-4.50.3.6-1.el8ev.noarch.rpm | SHA-256: 864c12cb1e6a8251883378e46736eff75da29558d7bc1cf235ed08f871be39ae |
vdsm-client-4.50.3.6-1.el8ev.noarch.rpm | SHA-256: 2e6a780d175e9d1ab367bd3bde0864ad75e8ef6bf3493d4f9ccec9938e3ba008 |
vdsm-common-4.50.3.6-1.el8ev.noarch.rpm | SHA-256: 6928ddf703dba82d5ce06641edfb9352d537ce36487fcdf29462eec243f8f745 |
vdsm-gluster-4.50.3.6-1.el8ev.x86_64.rpm | SHA-256: 5e9b8f9d8c5981de9c208807575a34f81250c97170605d3d13cb629aa875bdf4 |
vdsm-hook-checkips-4.50.3.6-1.el8ev.x86_64.rpm | SHA-256: ad1dacac1e50c89e73da2a5b3415dd662146c4f2f56a68121d6694b8dd606514 |
vdsm-hook-cpuflags-4.50.3.6-1.el8ev.noarch.rpm | SHA-256: c594acb7b116947df745a46b031195955d222bc32fc5f59b0f68579f072dde20 |
vdsm-hook-ethtool-options-4.50.3.6-1.el8ev.noarch.rpm | SHA-256: 930976038a485e2fd72bc2824e7e98345702fba5df4c3e0bffa1999812d18938 |
vdsm-hook-extra-ipv4-addrs-4.50.3.6-1.el8ev.x86_64.rpm | SHA-256: f202ab705b8e259cd943b69af744a60f43d8fdfc1007e30b25369ae7a54842ba |
vdsm-hook-fcoe-4.50.3.6-1.el8ev.noarch.rpm | SHA-256: 86752963eaef890840d41dbea1ff108f6414573d551b37f1cb82eda743f760cf |
vdsm-hook-localdisk-4.50.3.6-1.el8ev.noarch.rpm | SHA-256: 09d65962dc21c982ba56c11946422ec5a1f26194b8652abc0964ef408093284f |
vdsm-hook-nestedvt-4.50.3.6-1.el8ev.noarch.rpm | SHA-256: a169e66a0bce4e919ea6e0fa74b40995a40c5ad2d6b583d9e67f92849f9aee19 |
vdsm-hook-openstacknet-4.50.3.6-1.el8ev.noarch.rpm | SHA-256: ae640765766ab7b553a0f81c4e9f5e4e4af77a9c1b36be1f08b19947beea5aa5 |
vdsm-hook-vhostmd-4.50.3.6-1.el8ev.noarch.rpm | SHA-256: eaa554b7c273e11cc10380ea7a478b45d47a6ae763fda2bd8e96ede7f64601c7 |
vdsm-http-4.50.3.6-1.el8ev.noarch.rpm | SHA-256: 6f06645c2895baf48538fd0548a5fe65bccf03759d1debe2d05a2e5770c9faa4 |
vdsm-jsonrpc-4.50.3.6-1.el8ev.noarch.rpm | SHA-256: 0f90cad7912de2d35c31581597a8739d0c7fbbad62e2230e026cbb2fa735ebb6 |
vdsm-network-4.50.3.6-1.el8ev.x86_64.rpm | SHA-256: eb96c7a2500cae4421c44b7701635243fdf591cfd3c8757abd4f4a9706ca254a |
vdsm-python-4.50.3.6-1.el8ev.noarch.rpm | SHA-256: 60cc8145d2375c937d132cadf7513695f4ccfc07043a911fb41ddba7690cd41e |
vdsm-yajsonrpc-4.50.3.6-1.el8ev.noarch.rpm | SHA-256: 37c347b87f27d79857ad50f42c4f293d9a7efb475259de20a7a10196ac875433 |
Red Hat Virtualization Host 4 for RHEL 8
SRPM | |
---|---|
vdsm-4.50.3.6-1.el8ev.src.rpm | SHA-256: 966d0af029ea034bd4ff0322320df28ceb1c1c262fb3c97f3ca08b4d45e51a81 |
x86_64 | |
vdsm-hook-checkips-4.50.3.6-1.el8ev.x86_64.rpm | SHA-256: ad1dacac1e50c89e73da2a5b3415dd662146c4f2f56a68121d6694b8dd606514 |
vdsm-hook-cpuflags-4.50.3.6-1.el8ev.noarch.rpm | SHA-256: c594acb7b116947df745a46b031195955d222bc32fc5f59b0f68579f072dde20 |
vdsm-hook-ethtool-options-4.50.3.6-1.el8ev.noarch.rpm | SHA-256: 930976038a485e2fd72bc2824e7e98345702fba5df4c3e0bffa1999812d18938 |
vdsm-hook-extra-ipv4-addrs-4.50.3.6-1.el8ev.x86_64.rpm | SHA-256: f202ab705b8e259cd943b69af744a60f43d8fdfc1007e30b25369ae7a54842ba |
vdsm-hook-fcoe-4.50.3.6-1.el8ev.noarch.rpm | SHA-256: 86752963eaef890840d41dbea1ff108f6414573d551b37f1cb82eda743f760cf |
vdsm-hook-localdisk-4.50.3.6-1.el8ev.noarch.rpm | SHA-256: 09d65962dc21c982ba56c11946422ec5a1f26194b8652abc0964ef408093284f |
vdsm-hook-nestedvt-4.50.3.6-1.el8ev.noarch.rpm | SHA-256: a169e66a0bce4e919ea6e0fa74b40995a40c5ad2d6b583d9e67f92849f9aee19 |
vdsm-hook-openstacknet-4.50.3.6-1.el8ev.noarch.rpm | SHA-256: ae640765766ab7b553a0f81c4e9f5e4e4af77a9c1b36be1f08b19947beea5aa5 |
vdsm-hook-vhostmd-4.50.3.6-1.el8ev.noarch.rpm | SHA-256: eaa554b7c273e11cc10380ea7a478b45d47a6ae763fda2bd8e96ede7f64601c7 |
Red Hat Virtualization for IBM Power LE 4 for RHEL 8
SRPM | |
---|---|
vdsm-4.50.3.6-1.el8ev.src.rpm | SHA-256: 966d0af029ea034bd4ff0322320df28ceb1c1c262fb3c97f3ca08b4d45e51a81 |
ppc64le | |
vdsm-4.50.3.6-1.el8ev.ppc64le.rpm | SHA-256: 9e3ff53b8f37ac8f9e82a8e75bf0cd8f5c498413557ed2090fc00e7538721df8 |
vdsm-api-4.50.3.6-1.el8ev.noarch.rpm | SHA-256: 864c12cb1e6a8251883378e46736eff75da29558d7bc1cf235ed08f871be39ae |
vdsm-client-4.50.3.6-1.el8ev.noarch.rpm | SHA-256: 2e6a780d175e9d1ab367bd3bde0864ad75e8ef6bf3493d4f9ccec9938e3ba008 |
vdsm-common-4.50.3.6-1.el8ev.noarch.rpm | SHA-256: 6928ddf703dba82d5ce06641edfb9352d537ce36487fcdf29462eec243f8f745 |
vdsm-hook-checkips-4.50.3.6-1.el8ev.ppc64le.rpm | SHA-256: fa2cb2b03356b242930e6d24520e54f6fb262c8dffe10597cc128f95821007f0 |
vdsm-hook-cpuflags-4.50.3.6-1.el8ev.noarch.rpm | SHA-256: c594acb7b116947df745a46b031195955d222bc32fc5f59b0f68579f072dde20 |
vdsm-hook-ethtool-options-4.50.3.6-1.el8ev.noarch.rpm | SHA-256: 930976038a485e2fd72bc2824e7e98345702fba5df4c3e0bffa1999812d18938 |
vdsm-hook-extra-ipv4-addrs-4.50.3.6-1.el8ev.ppc64le.rpm | SHA-256: ad9367d922a2fe517127c440688bc420a6dc6a0260a8ad58bd11f2e3b0050ea7 |
vdsm-hook-fcoe-4.50.3.6-1.el8ev.noarch.rpm | SHA-256: 86752963eaef890840d41dbea1ff108f6414573d551b37f1cb82eda743f760cf |
vdsm-hook-localdisk-4.50.3.6-1.el8ev.noarch.rpm | SHA-256: 09d65962dc21c982ba56c11946422ec5a1f26194b8652abc0964ef408093284f |
vdsm-hook-nestedvt-4.50.3.6-1.el8ev.noarch.rpm | SHA-256: a169e66a0bce4e919ea6e0fa74b40995a40c5ad2d6b583d9e67f92849f9aee19 |
vdsm-hook-openstacknet-4.50.3.6-1.el8ev.noarch.rpm | SHA-256: ae640765766ab7b553a0f81c4e9f5e4e4af77a9c1b36be1f08b19947beea5aa5 |
vdsm-hook-vhostmd-4.50.3.6-1.el8ev.noarch.rpm | SHA-256: eaa554b7c273e11cc10380ea7a478b45d47a6ae763fda2bd8e96ede7f64601c7 |
vdsm-http-4.50.3.6-1.el8ev.noarch.rpm | SHA-256: 6f06645c2895baf48538fd0548a5fe65bccf03759d1debe2d05a2e5770c9faa4 |
vdsm-jsonrpc-4.50.3.6-1.el8ev.noarch.rpm | SHA-256: 0f90cad7912de2d35c31581597a8739d0c7fbbad62e2230e026cbb2fa735ebb6 |
vdsm-network-4.50.3.6-1.el8ev.ppc64le.rpm | SHA-256: 4ab9809e8a10e8b537a2f662d0fcbee3ee1eac4e36d2d5403b00353ab117c247 |
vdsm-python-4.50.3.6-1.el8ev.noarch.rpm | SHA-256: 60cc8145d2375c937d132cadf7513695f4ccfc07043a911fb41ddba7690cd41e |
vdsm-yajsonrpc-4.50.3.6-1.el8ev.noarch.rpm | SHA-256: 37c347b87f27d79857ad50f42c4f293d9a7efb475259de20a7a10196ac875433 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.