Skip to navigation

Security Advisory Important: Red Hat Enterprise Virtualization Manager 3.1

Advisory: RHSA-2012:1506-1
Type: Security Advisory
Severity: Important
Issued on: 2012-12-04
Last updated on: 2012-12-04
Affected Products: Red Hat Enterprise Virtualization 3
Red Hat Enterprise Virtualization 3.1
CVEs (cve.mitre.org): CVE-2011-4316
CVE-2012-0860
CVE-2012-0861
CVE-2012-2696
CVE-2012-5516

Details

Red Hat Enterprise Virtualization Manager 3.1 is now available.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

Red Hat Enterprise Virtualization Manager is a visual tool for centrally
managing collections of virtual servers running Red Hat Enterprise Linux
and Microsoft Windows. This package also includes the Red Hat Enterprise
Virtualization Manager API, a set of scriptable commands that give
administrators the ability to perform queries and operations on Red Hat
Enterprise Virtualization Manager.

A flaw was found in the way Red Hat Enterprise Linux hosts were added to
the Red Hat Enterprise Virtualization environment. The Python scripts
needed to configure the host for Red Hat Enterprise Virtualization were
stored in the "/tmp/" directory and could be pre-created by an attacker. A
local, unprivileged user on the host to be added to the Red Hat Enterprise
Virtualization environment could use this flaw to escalate their
privileges. This update provides the Red Hat Enterprise Virtualization
Manager part of the fix. The RHSA-2012:1508 VDSM update (Red Hat Enterprise
Linux hosts) must also be installed to completely fix this issue.
(CVE-2012-0860)

A flaw was found in the way Red Hat Enterprise Linux and Red Hat Enterprise
Virtualization Hypervisor hosts were added to the Red Hat Enterprise
Virtualization environment. The Python scripts needed to configure the host
for Red Hat Enterprise Virtualization were downloaded in an insecure way,
that is, without properly validating SSL certificates during HTTPS
connections. An attacker on the local network could use this flaw to
conduct a man-in-the-middle attack, potentially gaining root access to the
host being added to the Red Hat Enterprise Virtualization environment. This
update provides the Red Hat Enterprise Virtualization Manager part of the
fix. The RHSA-2012:1508 VDSM update (Red Hat Enterprise Linux hosts) or
RHSA-2012:1505 rhev-hypervisor6 update (Red Hat Enterprise Virtualization
Hypervisor hosts) must also be installed to completely fix this issue.
(CVE-2012-0861)

It was found that under certain conditions, Red Hat Enterprise
Virtualization Manager would fail to lock the screen on a virtual machine
between SPICE (Simple Protocol for Independent Computing Environments)
sessions. A user with access to a virtual machine in Red Hat Enterprise
Virtualization Manager could potentially exploit this flaw to gain access
to another user's unlocked desktop session. (CVE-2011-4316)

It was found that Red Hat Enterprise Virtualization Manager did not
correctly pass wipe-after-delete when moving disks between storage domains.
This resulted in such disks not being securely deleted as expected,
potentially leading to information disclosure. (CVE-2012-5516)

A flaw was found in the way the Red Hat Enterprise Virtualization Manager
back end checked the privileges of users making requests via the SOAP and
GWT APIs. An authenticated attacker able to issue queries against Red Hat
Enterprise Virtualization Manager could use this flaw to query data that
they should not have access to. (CVE-2012-2696)

These issues were discovered by Red Hat.

In addition to resolving the above security issues these updated Red Hat
Enterprise Virtualization Manager packages fix various bugs, and add
various enhancements.

Documentation for these bug fixes and enhancements is available in the
Technical Notes:

https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Virtualization/3.1/html/Technical_Notes/index.html

All Red Hat Enterprise Virtualization Manager users are advised to upgrade
to these updated packages which resolve these security issues, fix these
bugs, and add these enhancements.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Virtualization 3

SRPMS:
rhevm-3.1.0-32.el6ev.src.rpm
File outdated by:  RHBA-2013:0950
    MD5: ae4809e756286c2707d4d056feada578
SHA-256: 1c5560e2ea1b79339f5b3a100c7ca2681bbcb90ce61f48997683cbdb56cd198e
 
x86_64:
rhevm-3.1.0-32.el6ev.noarch.rpm
File outdated by:  RHBA-2013:0950
    MD5: 3211548f9ee18e5b203c02f213687810
SHA-256: 853fa76910f73ca163799aa24f7be987e9433b42e39a83c6940ee94699c55436
rhevm-backend-3.1.0-32.el6ev.noarch.rpm
File outdated by:  RHBA-2013:0950
    MD5: d201372eae087d803c39c00865757c11
SHA-256: da7d237faa2369fcbaefd4b3533f1a1ca1209f6682cdf075194f1c6f400f6fd2
rhevm-config-3.1.0-32.el6ev.noarch.rpm
File outdated by:  RHBA-2013:0950
    MD5: b704a8c3aece19963c0c8c9c31b496de
SHA-256: 17b4ca6601f2665d72b0b94e27ba5a05cc572cf4cdaa4b2b9e84664b2c28116c
rhevm-dbscripts-3.1.0-32.el6ev.noarch.rpm
File outdated by:  RHBA-2013:0950
    MD5: 8f20c50a61311f3c0f1e3edd28f7b82f
SHA-256: 2dbd8379fabca21527e7d5b668be194c1e5063ecdbf2de59e759abc25d183198
rhevm-genericapi-3.1.0-32.el6ev.noarch.rpm
File outdated by:  RHBA-2013:0950
    MD5: 3f17a59ad419aa7b9057ac5089d5e852
SHA-256: 281fa19c1d535603ddaac91699bb271abe791910f9a8911aa138d2edbeea1024
rhevm-notification-service-3.1.0-32.el6ev.noarch.rpm
File outdated by:  RHBA-2013:0950
    MD5: 1dd534b2e4a8a13f48bc8455fb4e5cac
SHA-256: 6d7d6498391eb6fff7c2f1334fe63bc54810806dbbf7757c4ddd13a9d90ec016
rhevm-restapi-3.1.0-32.el6ev.noarch.rpm
File outdated by:  RHBA-2013:0950
    MD5: 5713dacd29ac8bd5145c452ef708659d
SHA-256: 3b56f13f5954d10bd6c8425056748435ae708ef91fac57fb9692adc823eabdd9
rhevm-setup-3.1.0-32.el6ev.noarch.rpm
File outdated by:  RHBA-2013:1438
    MD5: 2a732c75d854b4bc8cdd41cafd976b20
SHA-256: 3506686a7dd3f077c209b18dcd9a82cf902e8b19356100b508e0716668bee545
rhevm-setup-plugin-allinone-3.1.0-32.el6ev.noarch.rpm
File outdated by:  RHBA-2013:0950
    MD5: 4614cd3a20a1e610dfc6531098e411c4
SHA-256: 9d79dfd52e490ae64e49d102de2343592d0dfff10eb62071c9bad2060fcf7d97
rhevm-tools-common-3.1.0-32.el6ev.noarch.rpm
File outdated by:  RHBA-2013:0950
    MD5: a501de1f397a041ca8137e13e8e81de5
SHA-256: 289e1bb23c355374f19e776f81fd5d0a67740c2749e89ad3f2b397b47675438b
rhevm-userportal-3.1.0-32.el6ev.noarch.rpm
File outdated by:  RHBA-2013:0950
    MD5: ad8331c62ab2e856e7dbd1af574ef999
SHA-256: 9bf144991f315a68438dd056ab1b30894f332cef3816079f91cd22a85da4025f
rhevm-webadmin-portal-3.1.0-32.el6ev.noarch.rpm
File outdated by:  RHBA-2013:0950
    MD5: 0b0221f1cce1eb63b177669bdf6a871e
SHA-256: abca6e8ab2ca05019c43e4f7466677872c5843482f05b609c2582c8a44adac0f
 
Red Hat Enterprise Virtualization 3.1

SRPMS:
rhevm-3.1.0-32.el6ev.src.rpm
File outdated by:  RHBA-2013:0950
    MD5: ae4809e756286c2707d4d056feada578
SHA-256: 1c5560e2ea1b79339f5b3a100c7ca2681bbcb90ce61f48997683cbdb56cd198e
 
x86_64:
rhevm-3.1.0-32.el6ev.noarch.rpm
File outdated by:  RHBA-2013:0950
    MD5: 3211548f9ee18e5b203c02f213687810
SHA-256: 853fa76910f73ca163799aa24f7be987e9433b42e39a83c6940ee94699c55436
rhevm-backend-3.1.0-32.el6ev.noarch.rpm
File outdated by:  RHBA-2013:0950
    MD5: d201372eae087d803c39c00865757c11
SHA-256: da7d237faa2369fcbaefd4b3533f1a1ca1209f6682cdf075194f1c6f400f6fd2
rhevm-config-3.1.0-32.el6ev.noarch.rpm
File outdated by:  RHBA-2013:0950
    MD5: b704a8c3aece19963c0c8c9c31b496de
SHA-256: 17b4ca6601f2665d72b0b94e27ba5a05cc572cf4cdaa4b2b9e84664b2c28116c
rhevm-dbscripts-3.1.0-32.el6ev.noarch.rpm
File outdated by:  RHBA-2013:0950
    MD5: 8f20c50a61311f3c0f1e3edd28f7b82f
SHA-256: 2dbd8379fabca21527e7d5b668be194c1e5063ecdbf2de59e759abc25d183198
rhevm-genericapi-3.1.0-32.el6ev.noarch.rpm
File outdated by:  RHBA-2013:0950
    MD5: 3f17a59ad419aa7b9057ac5089d5e852
SHA-256: 281fa19c1d535603ddaac91699bb271abe791910f9a8911aa138d2edbeea1024
rhevm-notification-service-3.1.0-32.el6ev.noarch.rpm
File outdated by:  RHBA-2013:0950
    MD5: 1dd534b2e4a8a13f48bc8455fb4e5cac
SHA-256: 6d7d6498391eb6fff7c2f1334fe63bc54810806dbbf7757c4ddd13a9d90ec016
rhevm-restapi-3.1.0-32.el6ev.noarch.rpm
File outdated by:  RHBA-2013:0950
    MD5: 5713dacd29ac8bd5145c452ef708659d
SHA-256: 3b56f13f5954d10bd6c8425056748435ae708ef91fac57fb9692adc823eabdd9
rhevm-setup-3.1.0-32.el6ev.noarch.rpm
File outdated by:  RHBA-2013:1438
    MD5: 2a732c75d854b4bc8cdd41cafd976b20
SHA-256: 3506686a7dd3f077c209b18dcd9a82cf902e8b19356100b508e0716668bee545
rhevm-setup-plugin-allinone-3.1.0-32.el6ev.noarch.rpm
File outdated by:  RHBA-2013:0950
    MD5: 4614cd3a20a1e610dfc6531098e411c4
SHA-256: 9d79dfd52e490ae64e49d102de2343592d0dfff10eb62071c9bad2060fcf7d97
rhevm-tools-common-3.1.0-32.el6ev.noarch.rpm
File outdated by:  RHBA-2013:0950
    MD5: a501de1f397a041ca8137e13e8e81de5
SHA-256: 289e1bb23c355374f19e776f81fd5d0a67740c2749e89ad3f2b397b47675438b
rhevm-userportal-3.1.0-32.el6ev.noarch.rpm
File outdated by:  RHBA-2013:0950
    MD5: ad8331c62ab2e856e7dbd1af574ef999
SHA-256: 9bf144991f315a68438dd056ab1b30894f332cef3816079f91cd22a85da4025f
rhevm-webadmin-portal-3.1.0-32.el6ev.noarch.rpm
File outdated by:  RHBA-2013:0950
    MD5: 0b0221f1cce1eb63b177669bdf6a871e
SHA-256: abca6e8ab2ca05019c43e4f7466677872c5843482f05b609c2582c8a44adac0f
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

754876 - CVE-2011-4316 SPICE screen locking race condition
790730 - CVE-2012-0860 rhev: vds_installer insecure /tmp use
790754 - CVE-2012-0861 rhev: vds_installer is prone to MITM when downloading 2nd stage installer
831565 - CVE-2012-2696 rhev: backend allows unprivileged queries
838300 - [engine][setupNetworks] Add sync network functionality
839230 - [RFE] Do not allow runon/pin-to host for user level api/portal
840280 - Improving import vm/tempate look & feel
848862 - Report event on time drift between engine and vdsm
852057 - Run once dialogue - need a face lift, usuability
858643 - [backup] using pg_dump --column-inserts slows down the restore process
862370 - web-admin/user-portal: support Japanese (ja)
875370 - CVE-2012-5516 rhev-m: MoveDisk ignores the disk's wipe-after-delete property


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/