exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Red Hat Security Advisory 2022-4931-01

Red Hat Security Advisory 2022-4931-01
Posted Jul 27, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-4931-01 - The RHV-M Appliance automates the process of installing and configuring the Red Hat Virtualization Manager. The appliance is available to download as an OVA file from the Customer Portal.

tags | advisory
systems | linux, redhat
advisories | CVE-2021-3677
SHA-256 | 82662c5af653189399a178ce7e14715d29a02e9034ef0109efacbd609c732bf9

Red Hat Security Advisory 2022-4931-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Moderate: RHV Appliance (rhvm-appliance) security update [ovirt-4.5.0]
Advisory ID: RHSA-2022:4931-01
Product: Red Hat Virtualization
Advisory URL: https://access.redhat.com/errata/RHSA-2022:4931
Issue date: 2022-06-07
CVE Names: CVE-2021-3677
====================================================================
1. Summary:

Updated RHV-M Appliance packages that fix several bugs and add various
enhancements are now available.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Virtualization 4 Hypervisor for RHEL 8 - x86_64
Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts - x86_64

3. Description:

The RHV-M Appliance automates the process of installing and configuring the
Red Hat Virtualization Manager. The appliance is available to download as
an OVA file from the Customer Portal.

Security Fix(es):

* postgresql: memory disclosure in certain queries (CVE-2021-3677)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the References section.

Bug Fix(es):

* RHV-M Appliance rebased on RHEL 8.6 (BZ#1997073)

* Previously, a self-hosted engine deployment failed when an OpenSCAP
security profile was applied, resulting in the SSH key permissions being
changed to 0640. In this release, the permissions are not changed and the
deployment succeeds. (BZ#2011309)

* rng-tools, rsyslog-gnutls, usbguard packages added to the RHV-M Appliance
to comply with DISA-STIG profile requirements (BZ#2070963)

* OVA package manifest added to the RHV-M Appliance RPM. (BZ#2070980)

* Previously, the nodejs package was downgraded during the RHV-M
installation.
In this release, the correct version of the nodejs package is installed and
maintained. (BZ#2075852)

* RHV-M Appliance rebased on Ceph 4.3 (BZ#2090137)

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/2974891

5. Bugs fixed (https://bugzilla.redhat.com/):

1958396 - RHV installation process downgrades some packages
1997073 - Rebase RHV-M Appliance on RHEL 8.6.0
2001857 - CVE-2021-3677 postgresql: memory disclosure in certain queries
2011309 - sshd service fails to start after rebooting to apply FIPS settings
2050071 - Use authselect in RHV-H and appliance images
2056146 - Hosted engine deployed failed since no enabled repositories can be found for engine setup.
2070963 - Include packages needed by DISA STIG
2070980 - [RFE] Include a manifest in the rpm
2073965 - [Hosted Engine]Error message "Destination directory /etc/fapolicyd/rules.d does not exist" is displayed but it is existed
2075852 - nodejs module not enabled causes nodejs downgrade to version 10
2090137 - Rebase rhvm-appliance on ceph 4.3

6. Package List:

Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts:

Source:
rhvm-appliance-4.5-20220603.1.el8ev.src.rpm

x86_64:
rhvm-appliance-4.5-20220603.1.el8ev.x86_64.rpm

Red Hat Virtualization 4 Hypervisor for RHEL 8:

Source:
rhvm-appliance-4.5-20220603.1.el8ev.src.rpm

x86_64:
rhvm-appliance-4.5-20220603.1.el8ev.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2021-3677
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBYuFj29zjgjWX9erEAQjj7RAAluJoSnFbhfCHvE/0HwzZIXt+LC5+QPor
HffFFR3MtPWTmQtlJCuFoyhRfBNU7CgUyEyOJI3BKycXv/NlpVRDQroRWQPz0tLF
ZmwByCjauSZ4OLCikYLDuIuZUHZPWWOLAh9d0wP1Im9GvYkaKiTIjvLMNsQt5U8h
NTADL/9OJMXpFDa6IvfpeBZXDnYUYUZEYhFKfZTHuSeOHcsRnPPRd3TcikLroxma
+Rqwn4VkN2CnJS0Z8XYf6Y7PCOif0ynxE7GH5xOEJ9qT36ikjw427bOBSMB4xU6K
0JWvYMVPv7d9BNxQhJe1F+Eg/vKLe6fZp1LLPS8BSK4uWoFsUOYaGDiPk/JdWUon
1YrH96YphQYxBtOz+4DITFsMe8TV9uDbq1P3zlHdCFRaCTiZFX0wk3ZgRvnF7TP2
9pWV0LEUwgjHs7nlVkdAxqQGJEz3U+CcGlwW9T4pji86J+nszzqZY9vdVcgMUetv
4jbVFkMr4bSoJwjIQVTSC5/BgbBvdG0cgGLNeamYfBXN5MROE2MkLR9n+PIrTUGG
vmaS+Ak8yNDX2r7P2dh62ebncnNu2z7gVl9DY3NwbxWArCvdxE9P0JfB7ogvLxv7
F1aHF4dJYnd3ABkmIvdTyWo8lLMH/EKPaxCCp489q4WJvOG9L+xH6l+SYoKA6x5t
OUChjlkp1dQ=hW7D
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

October 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    10 Files
  • 2
    Oct 2nd
    0 Files
  • 3
    Oct 3rd
    12 Files
  • 4
    Oct 4th
    15 Files
  • 5
    Oct 5th
    18 Files
  • 6
    Oct 6th
    16 Files
  • 7
    Oct 7th
    0 Files
  • 8
    Oct 8th
    0 Files
  • 9
    Oct 9th
    0 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close