what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Red Hat Security Advisory 2022-4896-01

Red Hat Security Advisory 2022-4896-01
Posted Jun 6, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-4896-01 - The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. Issues addressed include heap overflow, out of bounds write, and use-after-free vulnerabilities.

tags | advisory, overflow, vulnerability
systems | linux, redhat
advisories | CVE-2018-25032, CVE-2021-4028, CVE-2021-4083, CVE-2022-0778, CVE-2022-1271, CVE-2022-24903, CVE-2022-25636
SHA-256 | 3df1bd94283b4f8f828a1326c59af6e3f0bf7a7aa1e643f1d76923d175ca596f

Red Hat Security Advisory 2022-4896-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Important: Red Hat Virtualization security, bug fix, and enhancement update [ovirt-4.5.0]
Advisory ID: RHSA-2022:4896-01
Product: Red Hat Virtualization
Advisory URL: https://access.redhat.com/errata/RHSA-2022:4896
Issue date: 2022-06-03
CVE Names: CVE-2018-25032 CVE-2021-4028 CVE-2021-4083
CVE-2022-0778 CVE-2022-1271 CVE-2022-24903
CVE-2022-25636
====================================================================
1. Summary:

An update for imgbased, redhat-release-virtualization-host, and
redhat-virtualization-host is now available for Red Hat Virtualization 4
for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

RHEL 8-based RHEV-H for RHEV 4 (build requirements) - noarch, x86_64
Red Hat Virtualization 4 Hypervisor for RHEL 8 - x86_64

3. Description:

The redhat-virtualization-host packages provide the Red Hat Virtualization
Host. These packages include redhat-release-virtualization-host,
ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are
installed using a special build of Red Hat Enterprise Linux with only the
packages required to host virtual machines. RHVH features a Cockpit user
interface for monitoring the host's resources and performing administrative
tasks.

Security Fix(es):

* kernel: use-after-free in RDMA listen() (CVE-2021-4028)

* kernel: fget: check that the fd still exists after getting a ref to it
(CVE-2021-4083)

* kernel: heap out of bounds write in nf_dup_netdev.c (CVE-2022-25636)

* openssl: Infinite loop in BN_mod_sqrt() reachable when parsing
certificates (CVE-2022-0778)

* zlib: A flaw found in zlib when compressing (not decompressing) certain
inputs (CVE-2018-25032)

* gzip: arbitrary-file-write vulnerability (CVE-2022-1271)

* rsyslog: Heap-based overflow in TCP syslog server (CVE-2022-24903)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Bug Fixes:

* elfutils package has been update within RHV-H Channel to match the same
version released in RHEL (BZ#2038081)

* Rebase package(s) to version 1.2.24
For highlights, important fixes, or notable enhancements: see bugs in
"Depend On". (BZ#2057338)

* Rebase package(s) to version: 4.5.0

Highlights, important fixes, or notable enhancements: (BZ#2057342)

* Rebase package(s) to version anaconda-33.16.6.6-1.el8
For highlights and important bug fixes: include UI change for blocking
installation if root password is not set. (BZ#1899821)

* Red hat Virtualization Host has been rebased on Red Hat Enterprise Linux
8.6 (BZ#1997074)

* Previously, concurrent executions of LV refresh (lvchange) failed. This
hindered simultaneous starts of virtual machines that have thin-provisioned
disks based on the same disk on a block storage domain.
In this release, concurrent execution of LV refresh has been fixed in LVM2.
(BZ#2020497)

* Red Hat Virtualization Host has been rebased on latest Ceph 4.3
(BZ#2090138)

* In previous releases systemtap package could have been installed on top
of RHV-H from RHV-H channel. With 4.4 SP1 systemtap package installation is
not supported anymore (BZ#2052963)

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/2974891

5. Bugs fixed (https://bugzilla.redhat.com/):

1899821 - RHVH 4.4.3 anaconda UI proceeds to begin installation without root password provided
1997074 - Rebase RHV-H on RHEL 8.6
2020497 - Need to include lvm2-2.03.14-1.el8
2027201 - CVE-2021-4028 kernel: use-after-free in RDMA listen()
2029923 - CVE-2021-4083 kernel: fget: check that the fd still exists after getting a ref to it
2038081 - Upgrade elfutils to elfutils-0.186-1.el8
2052963 - [DOC] systemtap support dropped in RHV-H 4.4 SP1
2056334 - [RHVH-4.5.0] On UEFI machines, RHVH enters emergency mode when upgraded to 4.5.0
2056745 - sssd-ad can't be installed due to missing deps libsss_idmap
2056830 - CVE-2022-25636 kernel: heap out of bounds write in nf_dup_netdev.c
2057338 - Upgrade imgbased to 1.2.24
2057342 - Upgrade redhat-release-virtualization-host to 4.5.0
2062202 - CVE-2022-0778 openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates
2067945 - CVE-2018-25032 zlib: A flaw found in zlib when compressing (not decompressing) certain inputs
2073310 - CVE-2022-1271 gzip: arbitrary-file-write vulnerability
2081353 - CVE-2022-24903 rsyslog: Heap-based overflow in TCP syslog server
2086834 - Cannot install sssd daemon needed for AD Authentication
2090138 - Rebase RHV-H on Ceph 4.3

6. Package List:

Red Hat Virtualization 4 Hypervisor for RHEL 8:

Source:
elfutils-0.186-1.el8.src.rpm
redhat-virtualization-host-4.5.0-202205291010_8.6.src.rpm

x86_64:
elfutils-debuginfo-0.186-1.el8.x86_64.rpm
elfutils-debuginfod-client-0.186-1.el8.x86_64.rpm
elfutils-debuginfod-client-debuginfo-0.186-1.el8.x86_64.rpm
elfutils-debuginfod-debuginfo-0.186-1.el8.x86_64.rpm
elfutils-debugsource-0.186-1.el8.x86_64.rpm
elfutils-devel-0.186-1.el8.x86_64.rpm
elfutils-libelf-debuginfo-0.186-1.el8.x86_64.rpm
elfutils-libs-debuginfo-0.186-1.el8.x86_64.rpm
redhat-virtualization-host-image-update-4.5.0-202205291010_8.6.x86_64.rpm

RHEL 8-based RHEV-H for RHEV 4 (build requirements):

Source:
imgbased-1.2.24-1.el8ev.src.rpm
ovirt-node-ng-4.4.2-1.el8ev.src.rpm
redhat-release-virtualization-host-4.5.0-5.el8ev.src.rpm
redhat-virtualization-host-productimg-4.5.0-2.el8.src.rpm

noarch:
imgbased-1.2.24-1.el8ev.noarch.rpm
ovirt-node-ng-nodectl-4.4.2-1.el8ev.noarch.rpm
python3-imgbased-1.2.24-1.el8ev.noarch.rpm
python3-ovirt-node-ng-nodectl-4.4.2-1.el8ev.noarch.rpm
redhat-virtualization-host-image-update-placeholder-4.5.0-5.el8ev.noarch.rpm

x86_64:
redhat-release-virtualization-host-4.5.0-5.el8ev.x86_64.rpm
redhat-release-virtualization-host-content-4.5.0-5.el8ev.x86_64.rpm
redhat-virtualization-host-productimg-4.5.0-2.el8.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2018-25032
https://access.redhat.com/security/cve/CVE-2021-4028
https://access.redhat.com/security/cve/CVE-2021-4083
https://access.redhat.com/security/cve/CVE-2022-0778
https://access.redhat.com/security/cve/CVE-2022-1271
https://access.redhat.com/security/cve/CVE-2022-24903
https://access.redhat.com/security/cve/CVE-2022-25636
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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fz0l
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close