what you don't know can hurt you

Red Hat Security Advisory 2021-2239-01

Red Hat Security Advisory 2021-2239-01
Posted Jun 3, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-2239-01 - The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. Issues addressed include buffer overflow, denial of service, and integer overflow vulnerabilities.

tags | advisory, denial of service, overflow, vulnerability
systems | linux, redhat
advisories | CVE-2020-25659, CVE-2020-28196, CVE-2020-36242
MD5 | 365f1ad26e6efd06364c29b4976ba110

Red Hat Security Advisory 2021-2239-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Moderate: Red Hat Virtualization Host security update [ovirt-4.4.6]
Advisory ID: RHSA-2021:2239-01
Product: Red Hat Virtualization
Advisory URL: https://access.redhat.com/errata/RHSA-2021:2239
Issue date: 2021-06-03
CVE Names: CVE-2020-25659 CVE-2020-28196 CVE-2020-36242
====================================================================
1. Summary:

An update for imgbased, redhat-release-virtualization-host, and
redhat-virtualization-host is now available for Red Hat Virtualization 4
for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

RHEL 8-based RHEV-H for RHEV 4 (build requirements) - noarch, x86_64
Red Hat Virtualization 4 Hypervisor for RHEL 8 - x86_64
Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts - noarch

3. Description:

The redhat-virtualization-host packages provide the Red Hat Virtualization
Host. These packages include redhat-release-virtualization-host,
ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are
installed using a special build of Red Hat Enterprise Linux with only the
packages required to host virtual machines. RHVH features a Cockpit user
interface for monitoring the host's resources and performing administrative
tasks.

The redhat-virtualization-host packages provide the Red Hat Virtualization
Host. These packages include redhat-release-virtualization-host,
ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are
installed using a special build of Red Hat Enterprise Linux with only the
packages required to host virtual machines. RHVH features a Cockpit user
interface for monitoring the host's resources and performing administrative
tasks.

The ovirt-node-ng packages provide the Red Hat Virtualization Host. These
packages include redhat-release-virtualization-host, ovirt-node, and
rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a
special build of Red Hat Enterprise Linux with only the packages required
to host virtual machines. RHVH features a Cockpit user interface for
monitoring the host's resources and performing administrative tasks.

Security Fix(es):

* python-cryptography: bleichenbacher timing oracle attack against RSA
decryption (CVE-2020-25659)

* krb5: unbounded recursion via an ASN.1-encoded Kerberos message in
lib/krb5/asn.1/asn1_encode.c may lead to DoS (CVE-2020-28196)

* python-cryptography: certain sequences of update() calls when
symmetrically encrypting very large payloads could result in an integer
overflow and lead to buffer overflows (CVE-2020-36242)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the References section.

Bug Fix(es):

* Previously, old RPM files were not properly removed during package
removal (uninistall) or upgrade. As a result, removed packages were
reinstalled, or, during and upgrade, the system tried to install two or
more different versions at once, causing the upgrade to fail.
In this release, the dnf plugin has been fixed, and RPM packages are now
properly removed.
The new version will also auto-heal the broken system by removing RPM
packages which are not supposed to be in the persisted-rpms directory.
(BZ#1936972)

* With this release, ovirt-hosted-engine-ha supports multiple,
comma-separated values for all iSCSI configuration items. (BZ#1909888)

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/2974891

5. Bugs fixed (https://bugzilla.redhat.com/):

1779052 - RHVH 4.4: AVC denied errors (dac_override) in audit.log
1882542 - [downstream] Failed to assign network to Infiniband Bond
1889988 - CVE-2020-25659 python-cryptography: bleichenbacher timing oracle attack against RSA decryption
1897893 - RHVH does not keep the same IPv6 address on each reprovision
1901041 - CVE-2020-28196 krb5: unbounded recursion via an ASN.1-encoded Kerberos message in lib/krb5/asn.1/asn1_encode.c may lead to DoS
1901878 - Rebase RHV-H on RHEL 8.4
1909888 - [RFE] Support multiple IQN in hosted-engine.conf for Active-Active DR setup
1926226 - CVE-2020-36242 python-cryptography: certain sequences of update() calls when symmetrically encrypting very large payloads could result in an integer overflow and lead to buffer overflows
1931443 - After reboot a RHV-H host fails to boot displaying error: ../../grub-core/loader/i386/pc/linux.c:170:invalid magic number
1936972 - [RHVH] Failed to reinstall persisted RPMs
1938925 - RHV-H iso needs to include NetworkManager-1.26.0-12.el8_3 or later.
1942580 - End User License Agreement trademarks Shadowman but not new logo
1944632 - Rebase RHV-H 4.4.6 on FDP 2.11 21.C
1946095 - "No valid network interface has been found" when starting HE deployment via cockpit
1948944 - RHVH 4.4.6 ISO (RHVH-4.4-20210412.3-RHVH-x86_64-dvd1.iso) installation failed
1949431 - The directory of EULA presented on the UI is incorrect
1957604 - oVirt logo appears in RHV-H under the virtualization tab

6. Package List:

Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts:

Source:
cockpit-ovirt-0.15.0-2.el8ev.src.rpm
ovirt-hosted-engine-ha-2.4.7-1.el8ev.src.rpm

noarch:
cockpit-ovirt-dashboard-0.15.0-2.el8ev.noarch.rpm
ovirt-hosted-engine-ha-2.4.7-1.el8ev.noarch.rpm

Red Hat Virtualization 4 Hypervisor for RHEL 8:

Source:
redhat-virtualization-host-4.4.6-20210527.3.el8_4.src.rpm

x86_64:
elfutils-debuginfo-0.182-3.el8.x86_64.rpm
elfutils-debuginfod-client-0.182-3.el8.x86_64.rpm
elfutils-debuginfod-client-debuginfo-0.182-3.el8.x86_64.rpm
elfutils-debuginfod-debuginfo-0.182-3.el8.x86_64.rpm
elfutils-debugsource-0.182-3.el8.x86_64.rpm
elfutils-libelf-debuginfo-0.182-3.el8.x86_64.rpm
elfutils-libs-debuginfo-0.182-3.el8.x86_64.rpm
redhat-virtualization-host-image-update-4.4.6-20210527.3.el8_4.x86_64.rpm

RHEL 8-based RHEV-H for RHEV 4 (build requirements):

Source:
imgbased-1.2.19-1.el8ev.src.rpm
redhat-release-virtualization-host-4.4.6-1.el8ev.src.rpm
scap-security-guide-0.1.54-1.el8ev.src.rpm

noarch:
imgbased-1.2.19-1.el8ev.noarch.rpm
python3-imgbased-1.2.19-1.el8ev.noarch.rpm
redhat-virtualization-host-image-update-placeholder-4.4.6-1.el8ev.noarch.rpm
scap-security-guide-rhv-0.1.54-1.el8ev.noarch.rpm

x86_64:
redhat-release-virtualization-host-4.4.6-1.el8ev.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2020-25659
https://access.redhat.com/security/cve/CVE-2020-28196
https://access.redhat.com/security/cve/CVE-2020-36242
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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LMTC
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

June 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    35 Files
  • 2
    Jun 2nd
    14 Files
  • 3
    Jun 3rd
    40 Files
  • 4
    Jun 4th
    22 Files
  • 5
    Jun 5th
    1 Files
  • 6
    Jun 6th
    1 Files
  • 7
    Jun 7th
    19 Files
  • 8
    Jun 8th
    14 Files
  • 9
    Jun 9th
    39 Files
  • 10
    Jun 10th
    20 Files
  • 11
    Jun 11th
    22 Files
  • 12
    Jun 12th
    2 Files
  • 13
    Jun 13th
    1 Files
  • 14
    Jun 14th
    32 Files
  • 15
    Jun 15th
    34 Files
  • 16
    Jun 16th
    9 Files
  • 17
    Jun 17th
    33 Files
  • 18
    Jun 18th
    11 Files
  • 19
    Jun 19th
    1 Files
  • 20
    Jun 20th
    3 Files
  • 21
    Jun 21st
    2 Files
  • 22
    Jun 22nd
    21 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close