Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2022:0475: Red Hat Security Advisory: RHV Manager (ovirt-engine) security update [ovirt-4.4.10-1]

Updated ovirt-engine packages that fix several bugs and add various enhancements are now available. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2021-4104: log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender
  • CVE-2022-23302: log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink
  • CVE-2022-23305: log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender
  • CVE-2022-23307: log4j: Unsafe deserialization flaw in Chainsaw log viewer
Red Hat Security Data
#sql#vulnerability#web#linux#red_hat#nodejs#js#java#kubernetes

Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases

Red Hat Customer Portal

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus
  • Red Hat CodeReady Studio

Integration and Automation

  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager

All Products

Issued:

2022-02-08

Updated:

2022-02-08

RHSA-2022:0475 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Low: RHV Manager (ovirt-engine) security update [ovirt-4.4.10-1]

Type/Severity

Security Advisory: Low

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated ovirt-engine packages that fix several bugs and add various enhancements are now available.

Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The ovirt-engine package provides the manager for virtualization environments.
This manager enables admins to define hosts and networks, as well as to add
storage, create VMs and manage user permissions.

Security Fix(es):

  • log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender (CVE-2022-23305)
  • log4j: Unsafe deserialization flaw in Chainsaw log viewer (CVE-2022-23307)
  • log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender (CVE-2021-4104)
  • log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink (CVE-2022-23302)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

Bug Fix(es):

  • With this release, the ovirt-engine-extension-logger-log4j package has been removed. It is replaced by an internal ovirt-engine implementation.

When upgrading from earlier Red Hat Virtualization versions to RHV 4.4.10, the ovirt-engine-extension-logger-log4j package is uninstalled if it is present. If you used the ovirt-engine-extension-logger-log4j in earlier Red Hat Virtualization versions, you must manually remove the ovirt-engine-extension-logger-log4j configuration files and configure the new feature for sending log records to a remote syslog service, as outlined in the Administration Guide.

After a successful upgrade to RHV 4.4.10, you can uninstall log4j12 without breaking the Red Hat Virtualization setup by running the following command: `$ dnf remove log4j12`. (BZ#2044277)

  • Previously, when preparing a host with FIPS kernel parameters enabled, the boot UUID parameter was blank after reboot. In this release, the UUID is present in the kernel arguments. Enabling FIPS does not change the UUID after reboot. (BZ#2013430)
  • Because installing the self-hosted engine with Cockpit is deprecated, the ‘Installing Red Hat Virtualization as a self-hosted engine using the Cockpit web interface’ link

on the Red Hat Virtualization Administration Portal login page has been replaced with the “Installing Red Hat Virtualization as a self-hosted engine using the command line” link. (BZ#1992476)

  • In this release, Red Hat Virtualization 4.4.10 requires snmp4j version 3.6.4 or later, which no longer depends on the log4j library. (BZ#2044257)

Affected Products

  • Red Hat Virtualization Manager 4.4 x86_64

Fixes

  • BZ - 1992476 - [UI] Switch default installation method of HE on login page documentation links
  • BZ - 2013430 - RHV 4.4. FIPS install leaves UUID blank in grub after setting kernel option
  • BZ - 2031667 - CVE-2021-4104 log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender
  • BZ - 2041949 - CVE-2022-23302 log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink
  • BZ - 2041959 - CVE-2022-23305 log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender
  • BZ - 2041967 - CVE-2022-23307 log4j: Unsafe deserialization flaw in Chainsaw log viewer
  • BZ - 2044257 - Bump snmp4j library version to remove dependency on log4j
  • BZ - 2044277 - Replace ovirt-engine-extension-logger-log4j with internal ovirt-engine implementation

CVEs

  • CVE-2021-4104
  • CVE-2022-23302
  • CVE-2022-23305
  • CVE-2022-23307

References

  • https://access.redhat.com/security/updates/classification/#low
  • https://access.redhat.com/security/vulnerabilities/RHSB-2021-009

Red Hat Virtualization Manager 4.4

SRPM

ovirt-engine-4.4.10.6-0.1.el8ev.src.rpm

SHA-256: e72185955b4a2ff285e88cb911d5f389cf5aeeb9744579735d6560834f748bb6

rhvm-branding-rhv-4.4.10-1.el8ev.src.rpm

SHA-256: 0be59d055fa89c074464599dcb4a614375ba8d842cea7917f527ae43f689aa4d

snmp4j-3.6.4-0.1.el8ev.src.rpm

SHA-256: 5380808f94ae71eee20685e5b70301e38d2a9b1d49879fdb3d4847a54dbed8bb

x86_64

ovirt-engine-4.4.10.6-0.1.el8ev.noarch.rpm

SHA-256: 311a74b7182b20bae9bf5f834d6205f7231cc545c79d79f45abcff362b7d267d

ovirt-engine-backend-4.4.10.6-0.1.el8ev.noarch.rpm

SHA-256: c664be808b50f0a7df523a3d98183599f225cce2df599a8d0adf6ad92f4f83bc

ovirt-engine-dbscripts-4.4.10.6-0.1.el8ev.noarch.rpm

SHA-256: f04c176fa2e9d0e30f049e247b1343d8c4f9a543ca76ce56fa6f625d3dbc1ff3

ovirt-engine-health-check-bundler-4.4.10.6-0.1.el8ev.noarch.rpm

SHA-256: b3a53b26fe9fdb79f907a4d4efb1329e099a6373a7955991c993fe2ddca5191d

ovirt-engine-restapi-4.4.10.6-0.1.el8ev.noarch.rpm

SHA-256: 19a0ec298b7e7f10dd41086f83eca3df942f57e27d4ea69f28321305ed6f5a0d

ovirt-engine-setup-4.4.10.6-0.1.el8ev.noarch.rpm

SHA-256: f658efd449aaf78298f0421ae3005d7da05e7be9b7426ce4658242c7cf057684

ovirt-engine-setup-base-4.4.10.6-0.1.el8ev.noarch.rpm

SHA-256: f745c79a59bb4f36794462afe83829fa28b11afc4fa417887785409694a11962

ovirt-engine-setup-plugin-cinderlib-4.4.10.6-0.1.el8ev.noarch.rpm

SHA-256: 51d72bc39134d287231287a66437003290f57fa70937ca7a987a4a46403570e2

ovirt-engine-setup-plugin-imageio-4.4.10.6-0.1.el8ev.noarch.rpm

SHA-256: 21624f80198e5205ae5959df4370de08d9fb795b6037ae63f83c4b37a1b12648

ovirt-engine-setup-plugin-ovirt-engine-4.4.10.6-0.1.el8ev.noarch.rpm

SHA-256: 64c58e7913e0eeac0b58a90e6e453b01f4a42e4455203a4746957fa8a8d915a3

ovirt-engine-setup-plugin-ovirt-engine-common-4.4.10.6-0.1.el8ev.noarch.rpm

SHA-256: b3274bfb0c92a888fcc1f5baae1ca48cd8a4648e43e5615c22ed60debad53112

ovirt-engine-setup-plugin-vmconsole-proxy-helper-4.4.10.6-0.1.el8ev.noarch.rpm

SHA-256: 51a9acf460f40d741e7aa8580306ed0ab3391733d495aa0c215b0f507db7086d

ovirt-engine-setup-plugin-websocket-proxy-4.4.10.6-0.1.el8ev.noarch.rpm

SHA-256: ca0ae54eb0ffc4d674203ab6aab410886d834786f382c53363061b977e7d0bc8

ovirt-engine-tools-4.4.10.6-0.1.el8ev.noarch.rpm

SHA-256: 8c29dfffa3bd3d84c81899f6e82008b5d44d0529ce0a4de53b581c61c9201e3b

ovirt-engine-tools-backup-4.4.10.6-0.1.el8ev.noarch.rpm

SHA-256: 0bfc2c23175c499415998ed02a40fd3ee8418c91aa524b3f3a06c5627c423f32

ovirt-engine-vmconsole-proxy-helper-4.4.10.6-0.1.el8ev.noarch.rpm

SHA-256: 54d0f2e3184b80933c85474527589edb66af84fd9b96b2bec1a469fb869346be

ovirt-engine-webadmin-portal-4.4.10.6-0.1.el8ev.noarch.rpm

SHA-256: c7875d05be5657ae26b22e0a3b05c5f7892e488493fbe0e87386dd89281ad296

ovirt-engine-websocket-proxy-4.4.10.6-0.1.el8ev.noarch.rpm

SHA-256: b3f9e3b9e88c84d028deeb237b7cff26e878dfb4bbab313117b8dc589ecd683a

python3-ovirt-engine-lib-4.4.10.6-0.1.el8ev.noarch.rpm

SHA-256: 7339f589874e4997c88fc6ad92fc251f9316e8a17e786bad55eb7338b22d9c50

rhvm-4.4.10.6-0.1.el8ev.noarch.rpm

SHA-256: 82bde3643d61a76f94497d56b4ebf852efb92c0e6da20fc8aed1567557d25b74

rhvm-branding-rhv-4.4.10-1.el8ev.noarch.rpm

SHA-256: 00bc281beb8bc04903d6360ff8ae4daf205b486f624e3318bcffa754383f2534

snmp4j-3.6.4-0.1.el8ev.noarch.rpm

SHA-256: 28acd53d4232cde7debf8ca434935bcb0c670ff6cab03939695712c3a61c9bbc

snmp4j-javadoc-3.6.4-0.1.el8ev.noarch.rpm

SHA-256: de6f521063520fdc84e30b554781e0d667ac8598b9d59439b0b76367d1e84f00

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat Security Data: Latest News

RHSA-2023:5627: Red Hat Security Advisory: kernel security, bug fix, and enhancement update