Login
Newsletter
Werbung

Sicherheit: Zwei Probleme in RHV
Aktuelle Meldungen Distributionen
Name: Zwei Probleme in RHV
ID: RHSA-2021:1186-01
Distribution: Red Hat
Plattformen: Red Hat Virtualization
Datum: Mi, 14. April 2021, 23:22
Referenzen: https://access.redhat.com/security/cve/CVE-2019-20921
https://access.redhat.com/security/cve/CVE-2020-28458
Applikationen: RHV

Originalnachricht

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Moderate: RHV Manager (ovirt-engine) 4.4.z [ovirt-4.4.5]
0-day security, bug fix, enhance
Advisory ID: RHSA-2021:1186-01
Product: Red Hat Virtualization
Advisory URL: https://access.redhat.com/errata/RHSA-2021:1186
Issue date: 2021-04-14
CVE Names: CVE-2019-20921 CVE-2020-28458
=====================================================================

1. Summary:

An update for org.ovirt.engine-root, ovirt-engine-ui-extensions, and
ovirt-web-ui is now available for Red Hat Virtualization Engine 4.4.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4 - noarch

3. Description:

The ovirt-engine package provides the manager for virtualization
environments.
This manager enables admins to define hosts and networks, as well as to add
storage, create VMs and manage user permissions.

Bug Fix(es):
* Previously, saving user preferences in the Red Hat Virtualization Manager
required the MANIPULATE_USERS permission level. As a result, user
preferences were not saved on the server.
In this release, the required permission level for saving user preferences
was changed to EDIT_PROFILE, which is the permission level assigned by
default to all users. As a result, saving user preferences works as
expected. (BZ#1920539)

A list of bugs fixed in this update is available in the Technical Notes
book:

https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/ht
ml-single/technical_notes

Security Fix(es):

* nodejs-bootstrap-select: not escaping title values on <option> may lead
to XSS (CVE-2019-20921)

* datatables.net: prototype pollution if 'constructor' were used in a
data
property name (CVE-2020-28458)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/2974891

5. Bugs fixed (https://bugzilla.redhat.com/):

1171924 - [RFE] User Preferences / settings dialog with server-side storage
1750426 - [RFE] No clear/consistent indication that Upgrade Cluster is underway
1795457 - RHV-M causing high load on PostgreSQL DB after upgrade to 4.2
1882273 - CVE-2019-20921 nodejs-bootstrap-select: not escaping title values on
<option> may lead to XSS
1908441 - CVE-2020-28458 datatables.net: prototype pollution if
'constructor' were used in a data property name
1920539 - Error screen displayed after user login in admin portal.

6. Package List:

RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4:

Source:
ovirt-engine-4.4.5.11-0.1.el8ev.src.rpm
ovirt-engine-ui-extensions-1.2.5-1.el8ev.src.rpm
ovirt-web-ui-1.6.8-1.el8ev.src.rpm

noarch:
ovirt-engine-4.4.5.11-0.1.el8ev.noarch.rpm
ovirt-engine-backend-4.4.5.11-0.1.el8ev.noarch.rpm
ovirt-engine-dbscripts-4.4.5.11-0.1.el8ev.noarch.rpm
ovirt-engine-health-check-bundler-4.4.5.11-0.1.el8ev.noarch.rpm
ovirt-engine-restapi-4.4.5.11-0.1.el8ev.noarch.rpm
ovirt-engine-setup-4.4.5.11-0.1.el8ev.noarch.rpm
ovirt-engine-setup-base-4.4.5.11-0.1.el8ev.noarch.rpm
ovirt-engine-setup-plugin-cinderlib-4.4.5.11-0.1.el8ev.noarch.rpm
ovirt-engine-setup-plugin-imageio-4.4.5.11-0.1.el8ev.noarch.rpm
ovirt-engine-setup-plugin-ovirt-engine-4.4.5.11-0.1.el8ev.noarch.rpm
ovirt-engine-setup-plugin-ovirt-engine-common-4.4.5.11-0.1.el8ev.noarch.rpm
ovirt-engine-setup-plugin-vmconsole-proxy-helper-4.4.5.11-0.1.el8ev.noarch.rpm
ovirt-engine-setup-plugin-websocket-proxy-4.4.5.11-0.1.el8ev.noarch.rpm
ovirt-engine-tools-4.4.5.11-0.1.el8ev.noarch.rpm
ovirt-engine-tools-backup-4.4.5.11-0.1.el8ev.noarch.rpm
ovirt-engine-ui-extensions-1.2.5-1.el8ev.noarch.rpm
ovirt-engine-vmconsole-proxy-helper-4.4.5.11-0.1.el8ev.noarch.rpm
ovirt-engine-webadmin-portal-4.4.5.11-0.1.el8ev.noarch.rpm
ovirt-engine-websocket-proxy-4.4.5.11-0.1.el8ev.noarch.rpm
ovirt-web-ui-1.6.8-1.el8ev.noarch.rpm
python3-ovirt-engine-lib-4.4.5.11-0.1.el8ev.noarch.rpm
rhvm-4.4.5.11-0.1.el8ev.noarch.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2019-20921
https://access.redhat.com/security/cve/CVE-2020-28458
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html-single/technical_notes

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=BhsF
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung