what you don't know can hurt you

Red Hat Security Advisory 2020-1308-01

Red Hat Security Advisory 2020-1308-01
Posted Apr 3, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-1308-01 - The org.ovirt.engine-root is a core component of oVirt.

tags | advisory, root
systems | linux, redhat
advisories | CVE-2019-10086, CVE-2019-17195
MD5 | 042587da184d6137dd1038b7ca8c8384

Red Hat Security Advisory 2020-1308-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Low: Red Hat Virtualization Engine security, bug fix 4.3.9
Advisory ID: RHSA-2020:1308-01
Product: Red Hat Virtualization
Advisory URL: https://access.redhat.com/errata/RHSA-2020:1308
Issue date: 2020-04-02
Cross references: CVE-2019-17195 CVE-2019-10086
CVE Names: CVE-2019-10086 CVE-2019-17195
====================================================================
1. Summary:

An update is now available for Red Hat Virtualization Engine 4.3.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

RHV-M 4.3 - noarch
Tools for RHV Engine - noarch

3. Description:

The org.ovirt.engine-root is a core component of oVirt.

The following packages have been upgraded to a later upstream version:
org.ovirt.engine-root (4.3.8.2), ovirt-engine-dwh (4.3.8),
ovirt-engine-metrics (1.3.6.1), ovirt-fast-forward-upgrade (1.0.0),
ovirt-imageio-common (1.5.3), ovirt-imageio-proxy (1.5.3), ovirt-web-ui
(1.6.0), rhv-log-collector-analyzer (0.2.15), v2v-conversion-host (1.16.0).
(BZ#1767333, BZ#1776722, BZ#1779587, BZ#1779631)

Security Fix(es):

* CVE-2019-17195
* CVE-2019-10086

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Bug Fix(es):

* [downstream clone - 4.4.0] Upgrade from 4.3 to 4.4 will fail if there are
versioned templates in database (BZ#1688781)

* [ovirt-fast-forward-upgrade] Error:
ovirt-engine-setup-plugin-ovirt-engine conflicts with
ovirt-engine-4.2.5.2-0.1.el7ev.noarch (BZ#1754979)

* Users immediately logged out from User portal due to negative
UserSessionTimeOutInterval (BZ#1757423)

* Fluentd error when stopping metrics services through playbook on 4.3
(BZ#1772506)

* [downstream clone - 4.3.8] From VM Portal, users cannot create Operating
System Windows VM. (BZ#1773580)

* MERGE_STATUS fails with 'Invalid UUID string: mapper' when Direct LUN
that already exists is hot-plugged [RHV clone - 4.3.8] (BZ#1779664)

* Metric Store reports all hosts in Default cluster regardless of cluster
assignment. (BZ#1780234)

Enhancement(s):

* RFE for offline installation of RHV Metrics Store (BZ#1711873)

* [RFE] Compare storage with database for discrepancies (BZ#1739106)

* [RFE] RHV+Metrics Store - Support a Flat DNS environment without
subdomains (BZ#1782412)

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/2974891

5. Bugs fixed (https://bugzilla.redhat.com/):

1752522 - ovirt-fast-forward-upgrade: Upgrade from 4.2 to 4.3 fails with UnicodeEncodeError
1764791 - CVE-2019-17195 nimbus-jose-jwt: Uncaught exceptions while parsing a JWT
1767483 - CVE-2019-10086 apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default
1789737 - Import of OVA created from template fails with java.lang.NullPointerException [RHV clone - 4.3.9]
1792874 - Hide partial engine-cleanup option [RHV clone - 4.3.9]
1797496 - Add RHCOS os to osinfo - for compatability API between 4.3 to 4.4
1801310 - Module ovirt disk parameter storage domain has default option in documentation
1808038 - Unable to change Graphical Console of HE VM. [RHV clone - 4.3.9]
1808607 - RHVM 4.3.8.2 has Security Vulnerability Tenable Plugin ID 133165 in apache-commons-beanutils-1.8.3-14.el7
1809470 - [HE] ovirt-provider-ovn is non-functional on 4.3.9 Hosted-Engine [RHV clone - 4.3.9]
1810527 - Upgrade rhvm-dependencies to 4.3.2

6. Package List:

Tools for RHV Engine:

Source:
apache-commons-beanutils-1.8.3-15.el7_7.src.rpm

noarch:
apache-commons-beanutils-1.8.3-15.el7_7.noarch.rpm
apache-commons-beanutils-javadoc-1.8.3-15.el7_7.noarch.rpm

RHV-M 4.3:

Source:
ovirt-engine-4.3.9.3-0.1.el7.src.rpm
ovirt-engine-extension-aaa-misc-1.0.4-1.el7ev.src.rpm
ovirt-fast-forward-upgrade-1.0.0-17.el7ev.src.rpm
rhvm-dependencies-4.3.2-1.el7ev.src.rpm

noarch:
ovirt-engine-4.3.9.3-0.1.el7.noarch.rpm
ovirt-engine-backend-4.3.9.3-0.1.el7.noarch.rpm
ovirt-engine-dbscripts-4.3.9.3-0.1.el7.noarch.rpm
ovirt-engine-extension-aaa-misc-1.0.4-1.el7ev.noarch.rpm
ovirt-engine-extensions-api-impl-4.3.9.3-0.1.el7.noarch.rpm
ovirt-engine-extensions-api-impl-javadoc-4.3.9.3-0.1.el7.noarch.rpm
ovirt-engine-health-check-bundler-4.3.9.3-0.1.el7.noarch.rpm
ovirt-engine-restapi-4.3.9.3-0.1.el7.noarch.rpm
ovirt-engine-setup-4.3.9.3-0.1.el7.noarch.rpm
ovirt-engine-setup-base-4.3.9.3-0.1.el7.noarch.rpm
ovirt-engine-setup-plugin-cinderlib-4.3.9.3-0.1.el7.noarch.rpm
ovirt-engine-setup-plugin-ovirt-engine-4.3.9.3-0.1.el7.noarch.rpm
ovirt-engine-setup-plugin-ovirt-engine-common-4.3.9.3-0.1.el7.noarch.rpm
ovirt-engine-setup-plugin-vmconsole-proxy-helper-4.3.9.3-0.1.el7.noarch.rpm
ovirt-engine-setup-plugin-websocket-proxy-4.3.9.3-0.1.el7.noarch.rpm
ovirt-engine-tools-4.3.9.3-0.1.el7.noarch.rpm
ovirt-engine-tools-backup-4.3.9.3-0.1.el7.noarch.rpm
ovirt-engine-vmconsole-proxy-helper-4.3.9.3-0.1.el7.noarch.rpm
ovirt-engine-webadmin-portal-4.3.9.3-0.1.el7.noarch.rpm
ovirt-engine-websocket-proxy-4.3.9.3-0.1.el7.noarch.rpm
ovirt-fast-forward-upgrade-1.0.0-17.el7ev.noarch.rpm
python2-ovirt-engine-lib-4.3.9.3-0.1.el7.noarch.rpm
rhvm-4.3.9.3-0.1.el7.noarch.rpm
rhvm-dependencies-4.3.2-1.el7ev.noarch.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2019-10086
https://access.redhat.com/security/cve/CVE-2019-17195
https://access.redhat.com/security/updates/classification/#low

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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bGUs
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

June 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    10 Files
  • 2
    Jun 2nd
    0 Files
  • 3
    Jun 3rd
    0 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    0 Files
  • 7
    Jun 7th
    0 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    0 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close