exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Red Hat Security Advisory 2022-4931-01

Red Hat Security Advisory 2022-4931-01
Posted Jul 27, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-4931-01 - The RHV-M Appliance automates the process of installing and configuring the Red Hat Virtualization Manager. The appliance is available to download as an OVA file from the Customer Portal.

tags | advisory
systems | linux, redhat
advisories | CVE-2021-3677
SHA-256 | 82662c5af653189399a178ce7e14715d29a02e9034ef0109efacbd609c732bf9

Red Hat Security Advisory 2022-4931-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Moderate: RHV Appliance (rhvm-appliance) security update [ovirt-4.5.0]
Advisory ID: RHSA-2022:4931-01
Product: Red Hat Virtualization
Advisory URL: https://access.redhat.com/errata/RHSA-2022:4931
Issue date: 2022-06-07
CVE Names: CVE-2021-3677
====================================================================
1. Summary:

Updated RHV-M Appliance packages that fix several bugs and add various
enhancements are now available.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Virtualization 4 Hypervisor for RHEL 8 - x86_64
Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts - x86_64

3. Description:

The RHV-M Appliance automates the process of installing and configuring the
Red Hat Virtualization Manager. The appliance is available to download as
an OVA file from the Customer Portal.

Security Fix(es):

* postgresql: memory disclosure in certain queries (CVE-2021-3677)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the References section.

Bug Fix(es):

* RHV-M Appliance rebased on RHEL 8.6 (BZ#1997073)

* Previously, a self-hosted engine deployment failed when an OpenSCAP
security profile was applied, resulting in the SSH key permissions being
changed to 0640. In this release, the permissions are not changed and the
deployment succeeds. (BZ#2011309)

* rng-tools, rsyslog-gnutls, usbguard packages added to the RHV-M Appliance
to comply with DISA-STIG profile requirements (BZ#2070963)

* OVA package manifest added to the RHV-M Appliance RPM. (BZ#2070980)

* Previously, the nodejs package was downgraded during the RHV-M
installation.
In this release, the correct version of the nodejs package is installed and
maintained. (BZ#2075852)

* RHV-M Appliance rebased on Ceph 4.3 (BZ#2090137)

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/2974891

5. Bugs fixed (https://bugzilla.redhat.com/):

1958396 - RHV installation process downgrades some packages
1997073 - Rebase RHV-M Appliance on RHEL 8.6.0
2001857 - CVE-2021-3677 postgresql: memory disclosure in certain queries
2011309 - sshd service fails to start after rebooting to apply FIPS settings
2050071 - Use authselect in RHV-H and appliance images
2056146 - Hosted engine deployed failed since no enabled repositories can be found for engine setup.
2070963 - Include packages needed by DISA STIG
2070980 - [RFE] Include a manifest in the rpm
2073965 - [Hosted Engine]Error message "Destination directory /etc/fapolicyd/rules.d does not exist" is displayed but it is existed
2075852 - nodejs module not enabled causes nodejs downgrade to version 10
2090137 - Rebase rhvm-appliance on ceph 4.3

6. Package List:

Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts:

Source:
rhvm-appliance-4.5-20220603.1.el8ev.src.rpm

x86_64:
rhvm-appliance-4.5-20220603.1.el8ev.x86_64.rpm

Red Hat Virtualization 4 Hypervisor for RHEL 8:

Source:
rhvm-appliance-4.5-20220603.1.el8ev.src.rpm

x86_64:
rhvm-appliance-4.5-20220603.1.el8ev.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2021-3677
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBYuFj29zjgjWX9erEAQjj7RAAluJoSnFbhfCHvE/0HwzZIXt+LC5+QPor
HffFFR3MtPWTmQtlJCuFoyhRfBNU7CgUyEyOJI3BKycXv/NlpVRDQroRWQPz0tLF
ZmwByCjauSZ4OLCikYLDuIuZUHZPWWOLAh9d0wP1Im9GvYkaKiTIjvLMNsQt5U8h
NTADL/9OJMXpFDa6IvfpeBZXDnYUYUZEYhFKfZTHuSeOHcsRnPPRd3TcikLroxma
+Rqwn4VkN2CnJS0Z8XYf6Y7PCOif0ynxE7GH5xOEJ9qT36ikjw427bOBSMB4xU6K
0JWvYMVPv7d9BNxQhJe1F+Eg/vKLe6fZp1LLPS8BSK4uWoFsUOYaGDiPk/JdWUon
1YrH96YphQYxBtOz+4DITFsMe8TV9uDbq1P3zlHdCFRaCTiZFX0wk3ZgRvnF7TP2
9pWV0LEUwgjHs7nlVkdAxqQGJEz3U+CcGlwW9T4pji86J+nszzqZY9vdVcgMUetv
4jbVFkMr4bSoJwjIQVTSC5/BgbBvdG0cgGLNeamYfBXN5MROE2MkLR9n+PIrTUGG
vmaS+Ak8yNDX2r7P2dh62ebncnNu2z7gVl9DY3NwbxWArCvdxE9P0JfB7ogvLxv7
F1aHF4dJYnd3ABkmIvdTyWo8lLMH/EKPaxCCp489q4WJvOG9L+xH6l+SYoKA6x5t
OUChjlkp1dQ=hW7D
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close