Skip to navigation

Security Advisory Moderate: rhevm 3.1.2 security and bug fix update

Advisory: RHSA-2013:0211-2
Type: Security Advisory
Severity: Moderate
Issued on: 2013-02-04
Last updated on: 2013-02-04
Affected Products: Red Hat Enterprise Virtualization 3
Red Hat Enterprise Virtualization 3.1
CVEs (cve.mitre.org): CVE-2012-6115
CVE-2013-0168

Details

Updated rhevm packages that fix two security issues and various bugs are
now available.

The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

The Red Hat Enterprise Virtualization Manager is a centralized management
platform that allows system administrators to view and manage virtual
machines. The Red Hat Enterprise Virtualization Manager provides a
comprehensive range of features including search capabilities, resource
management, live migrations, and virtual infrastructure provisioning. The
Manager is a JBoss Application Server application that provides several
interfaces through which the virtual environment can be accessed and
interacted with, including an Administration Portal, a User Portal, and a
Representational State Transfer (REST) Application Programming Interface
(API).

It was discovered that running the domain management tool with the validate
action ("rhevm-manage-domains -action=validate") logged administrative
passwords to a world-readable log file. A local attacker could use this
flaw to gain control of systems that are managed by Red Hat Enterprise
Virtualization Manager. (CVE-2012-6115)

A flaw was found in the way the MoveDisk command checked permissions on the
target storage domain. A privileged user (a storage admin of a storage
domain) could use this flaw to exhaust all available free space in another
storage domain they would otherwise not have access to. (CVE-2013-0168)

The CVE-2012-6115 issue was discovered by Andrew Cathrow of Red Hat. The
CVE-2013-0168 issue was discovered by Ondrej Machacek of Red Hat.

Previously, upgrading from Red Hat Enterprise Virtualization Manager 3.0 to
3.1 was not formally supported by Red Hat. This update fixes a number of
known issues with the upgrade process. As a result, upgrading from Red Hat
Enterprise Virtualization Manager 3.0 to 3.1 is now supported.

For more information on upgrading to Red Hat Enterprise Virtualization
Manager 3.1, consult the Installation Guide:

https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Virtualization/3.1/html/Installation_Guide/chap-Upgrading_to_Red_Hat_Enterprise_Virtualization_3.1.html

Additional tips and considerations to take into account are also available
in the Red Hat Knowledgebase:

https://access.redhat.com/knowledge/articles/269333

Information on the bugs fixed in this update is available in the Technical
Notes document:

https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Virtualization/3.1/html/Technical_Notes/chap-RHSA-2013-0211.html

All Red Hat Enterprise Virtualization Manager administrators are advised to
install these updated packages, which fix these issues.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Virtualization/3.1/html/Installation_Guide/chap-Upgrading_to_Red_Hat_Enterprise_Virtualization_3.1.html

Updated packages

Red Hat Enterprise Virtualization 3

SRPMS:
rhevm-3.1.0-43.el6ev.src.rpm
File outdated by:  RHBA-2013:0950
    MD5: ac0fb4cdfdb6a955c0431bd9d14abb81
SHA-256: d7ebda31d2de09901851a544dbb652636952b6afb3fa6a088a75399828ae9828
 
x86_64:
rhevm-3.1.0-43.el6ev.noarch.rpm
File outdated by:  RHBA-2013:0950
    MD5: dee0edca1b49fecd5bff0fb8ac3091aa
SHA-256: 35a48301a59020bbe8cef6e6aedeae320cf7b938835e9160fcaaaf01871a56e9
rhevm-backend-3.1.0-43.el6ev.noarch.rpm
File outdated by:  RHBA-2013:0950
    MD5: 55e4bfd36bc9bf32c85bc612bc5458a4
SHA-256: d0a0deac13c49223dd66593a33ada888b7f6a17b0a74fb0f5958d5e9617903cb
rhevm-config-3.1.0-43.el6ev.noarch.rpm
File outdated by:  RHBA-2013:0950
    MD5: 325b809f1b7ca3d8581c101aae7f739f
SHA-256: 5353106d8eef9fc07769f12a3d2821755b8f362134471ccebcfc2b0c9fd26468
rhevm-dbscripts-3.1.0-43.el6ev.noarch.rpm
File outdated by:  RHBA-2013:0950
    MD5: 95fec46a49f2102564cd83a80c99bfa3
SHA-256: 797d20884432e119d61c367e2a870761dd4ba27a3170e4189d9f7561a18bd3be
rhevm-genericapi-3.1.0-43.el6ev.noarch.rpm
File outdated by:  RHBA-2013:0950
    MD5: c5a995e8d1798d8fa4c7420a4880c8ec
SHA-256: fd2fd3bf5a9408dc0863767aabde18b24bf7236bac587dedb3165b296d3a8ce5
rhevm-notification-service-3.1.0-43.el6ev.noarch.rpm
File outdated by:  RHBA-2013:0950
    MD5: 4385c97a20244f6e140b8aec26c7a411
SHA-256: b2069163136ca49031feda76953348eac2b114fb90f76a12312c39858d922b9a
rhevm-restapi-3.1.0-43.el6ev.noarch.rpm
File outdated by:  RHBA-2013:0950
    MD5: 539116d21827a5f5f9d10c7a0565b7e1
SHA-256: e5637adb45a1b67ed93ef1e0e1cba6d20373667a8e6583ac9a4710a77e877d12
rhevm-setup-3.1.0-43.el6ev.noarch.rpm
File outdated by:  RHBA-2013:1438
    MD5: 02f659dbc8a5be184cde34befbe671a7
SHA-256: bfc75f89c3b0a48b8d738f52cde0e7323e9ac35ab62e0da4eb15ee225497fcf1
rhevm-setup-plugin-allinone-3.1.0-43.el6ev.noarch.rpm
File outdated by:  RHBA-2013:0950
    MD5: 6901726939f19ad933372b043b8dc56e
SHA-256: fbf2d2f4eeee63013a984dbb7cf9fc25ba9e3841ff00d245905b2719fe7630be
rhevm-tools-common-3.1.0-43.el6ev.noarch.rpm
File outdated by:  RHBA-2013:0950
    MD5: 0d54a2ae4e299278b70c80ebd90be226
SHA-256: 03d12bce1bf57a4d29218b53dade8909c166bca616b51e68d6b06b28081b3d9e
rhevm-userportal-3.1.0-43.el6ev.noarch.rpm
File outdated by:  RHBA-2013:0950
    MD5: 48be587404b96fa035d761d85de804cf
SHA-256: 65d37c37d5b07c0c0b32b3b8083157472ee67147328fd2896c3419fdafc811f3
rhevm-webadmin-portal-3.1.0-43.el6ev.noarch.rpm
File outdated by:  RHBA-2013:0950
    MD5: a0a273237030ddbdb03194116c04073b
SHA-256: c8b9c752e39943692d3207d58eb35c2385dd0c8e14b2362c715d46cb2d21f749
 
Red Hat Enterprise Virtualization 3.1

SRPMS:
rhevm-3.1.0-43.el6ev.src.rpm
File outdated by:  RHBA-2013:0950
    MD5: ac0fb4cdfdb6a955c0431bd9d14abb81
SHA-256: d7ebda31d2de09901851a544dbb652636952b6afb3fa6a088a75399828ae9828
 
x86_64:
rhevm-3.1.0-43.el6ev.noarch.rpm
File outdated by:  RHBA-2013:0950
    MD5: dee0edca1b49fecd5bff0fb8ac3091aa
SHA-256: 35a48301a59020bbe8cef6e6aedeae320cf7b938835e9160fcaaaf01871a56e9
rhevm-backend-3.1.0-43.el6ev.noarch.rpm
File outdated by:  RHBA-2013:0950
    MD5: 55e4bfd36bc9bf32c85bc612bc5458a4
SHA-256: d0a0deac13c49223dd66593a33ada888b7f6a17b0a74fb0f5958d5e9617903cb
rhevm-config-3.1.0-43.el6ev.noarch.rpm
File outdated by:  RHBA-2013:0950
    MD5: 325b809f1b7ca3d8581c101aae7f739f
SHA-256: 5353106d8eef9fc07769f12a3d2821755b8f362134471ccebcfc2b0c9fd26468
rhevm-dbscripts-3.1.0-43.el6ev.noarch.rpm
File outdated by:  RHBA-2013:0950
    MD5: 95fec46a49f2102564cd83a80c99bfa3
SHA-256: 797d20884432e119d61c367e2a870761dd4ba27a3170e4189d9f7561a18bd3be
rhevm-genericapi-3.1.0-43.el6ev.noarch.rpm
File outdated by:  RHBA-2013:0950
    MD5: c5a995e8d1798d8fa4c7420a4880c8ec
SHA-256: fd2fd3bf5a9408dc0863767aabde18b24bf7236bac587dedb3165b296d3a8ce5
rhevm-notification-service-3.1.0-43.el6ev.noarch.rpm
File outdated by:  RHBA-2013:0950
    MD5: 4385c97a20244f6e140b8aec26c7a411
SHA-256: b2069163136ca49031feda76953348eac2b114fb90f76a12312c39858d922b9a
rhevm-restapi-3.1.0-43.el6ev.noarch.rpm
File outdated by:  RHBA-2013:0950
    MD5: 539116d21827a5f5f9d10c7a0565b7e1
SHA-256: e5637adb45a1b67ed93ef1e0e1cba6d20373667a8e6583ac9a4710a77e877d12
rhevm-setup-3.1.0-43.el6ev.noarch.rpm
File outdated by:  RHBA-2013:1438
    MD5: 02f659dbc8a5be184cde34befbe671a7
SHA-256: bfc75f89c3b0a48b8d738f52cde0e7323e9ac35ab62e0da4eb15ee225497fcf1
rhevm-setup-plugin-allinone-3.1.0-43.el6ev.noarch.rpm
File outdated by:  RHBA-2013:0950
    MD5: 6901726939f19ad933372b043b8dc56e
SHA-256: fbf2d2f4eeee63013a984dbb7cf9fc25ba9e3841ff00d245905b2719fe7630be
rhevm-tools-common-3.1.0-43.el6ev.noarch.rpm
File outdated by:  RHBA-2013:0950
    MD5: 0d54a2ae4e299278b70c80ebd90be226
SHA-256: 03d12bce1bf57a4d29218b53dade8909c166bca616b51e68d6b06b28081b3d9e
rhevm-userportal-3.1.0-43.el6ev.noarch.rpm
File outdated by:  RHBA-2013:0950
    MD5: 48be587404b96fa035d761d85de804cf
SHA-256: 65d37c37d5b07c0c0b32b3b8083157472ee67147328fd2896c3419fdafc811f3
rhevm-webadmin-portal-3.1.0-43.el6ev.noarch.rpm
File outdated by:  RHBA-2013:0950
    MD5: a0a273237030ddbdb03194116c04073b
SHA-256: c8b9c752e39943692d3207d58eb35c2385dd0c8e14b2362c715d46cb2d21f749
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

842134 - [Storage] cannot force extend block storage domains (no force extendVG support)
854214 - engine: logging - when domain is partially inaccessible event log does not report which luns are inaccessible
881059 - RESTAPI: RSDL does not document lun-based disks parameters for add()
881121 - [es_ES] heading "Virtual size" is truncated in Spanish [LAYOUT]
881783 - ovrit-engine-backend:.rollbackQuota ignores disabled quota
883893 - [ja_JP] Test case failure: Host Tab [LAYOUT] - "no network assigned" translation doesn't fit a single line
883896 - [ja_JP] Test case failure: Storage Tab: General sub-tab: unnecessary colon (":") between "Used: xxxxGB" line and NFS Export Path
883903 - [es_ES] Event Tab, Advance view 's heading Event is truncated [LAYOUT]
883910 - [ja_JP] Test case failure: Disk Tab: Remove Disk(s) dialog: "[disk-alias] is Bootable and Attached to [n] VM(s)" message structure need to be revised.
883915 - Portal Login button label is not localized
883933 - [zh_CN] Truncation column name on logical networks sub tab [LAYOUT]
886166 - Backend: CPU pinning works only with single-digit CPU's
886520 - Create ISCSI LUN Disk: Connection details should be mandatory
886654 - [ja_JP] Test case failure: Check the message for Alert/Events/Tasks: The Date part of the message contains minutes in the month-section.
887856 - [ja_JP] Test case failure: Virtual Machines [LAYOUT]: New VM dialog -> Resrouce Allocation section -> string "clone" is broken into two lines
887904 - [rhevm-upgrade] during upgrade rhev-guest-tools-iso is not updated to latest version and remains with old version
888039 - Failed Hot-Plug and Hot-UnPlug Direct LUN in FC DC environment
888309 - Importing a VM from an OVF without the diskAlias property with copyCollapse=false will not auto-generate disk aliases
888317 - [engine] [upgrade] Unable to perform operations as user on existing VM after upgrade from RHEV 3.0 to 3.1
888785 - [RHEVM Web Admin Portal localization] Zanata source strings (rhevm-3.1 version) containing "oVirt" and "Engine"
889792 - 'Configure Local Disk' does not work properly in Japanese environment
891631 - rhevm-upgrade must check for enough disk space to perform an upgrade before starting the upgrade
893355 - CVE-2013-0168 rhev-m: insufficient MoveDisk target domain permission checks
902341 - [User Portal] An user with UserRole assigned to a pool does not see pool's VMs
905865 - CVE-2012-6115 rhev: rhevm-manage-domains logs admin passwords


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/