RHEL 8 : RHV Manager security update (ovirt-engine) [ovirt-4.4.6] (Moderate) (RHSA-2021:2179)

high Nessus Plugin ID 150124

Synopsis

The remote Red Hat host is missing one or more security updates for RHV Manager.

Description

The remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2021:2179 advisory.

The ovirt-engine package provides the manager for virtualization environments.
This manager enables admins to define hosts and networks, as well as to add storage, create VMs and manage user permissions.

A list of bugs fixed in this update is available in the Technical Notes book:

https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html-single/technical_notes

Security Fix(es):

* nodejs-lodash: command injection via template (CVE-2021-23337)

* nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions (CVE-2020-28500)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* This release adds the queue attribute to the virtio-scsi driver in the virtual machine configuration.
This improvement enables multi-queue performance with the virtio-scsi driver. (BZ#911394)

* With this release, source-load-balancing has been added as a new sub-option for xmit_hash_policy. It can be configured for bond modes balance-xor (2), 802.3ad (4) and balance-tlb (5), by specifying xmit_hash_policy=vlan+srcmac. (BZ#1683987)

* The default DataCenter/Cluster will be set to compatibility level 4.6 on new installations of Red Hat Virtualization 4.4.6.; (BZ#1950348)

* With this release, support has been added for copying disks between regular Storage Domains and Managed Block Storage Domains.
It is now possible to migrate disks between Managed Block Storage Domains and regular Storage Domains.
(BZ#1906074)

* Previously, the engine-config value LiveSnapshotPerformFreezeInEngine was set by default to false and was supposed to be uses in cluster compatibility levels below 4.4. The value was set to general version.
With this release, each cluster level has it's own value, defaulting to false for 4.4 and above. This will reduce unnecessary overhead in removing time outs of the file system freeze command. (BZ#1932284)

* With this release, running virtual machines is supported for up to 16TB of RAM on x86_64 architectures.
(BZ#1944723)

* This release adds the gathering of oVirt/RHV related certificates to allow easier debugging of issues for faster customer help and issue resolution.
Information from certificates is now included as part of the sosreport. Note that no corresponding private key information is gathered, due to security considerations. (BZ#1845877)

Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the RHEL RHV Manager package based on the guidance in RHSA-2021:2179.

See Also

https://bugzilla.redhat.com/show_bug.cgi?id=1950466

https://bugzilla.redhat.com/show_bug.cgi?id=1954401

http://www.nessus.org/u?b4e9fb3f

http://www.nessus.org/u?ef72b39b

https://access.redhat.com/security/updates/classification/#moderate

https://access.redhat.com/errata/RHSA-2021:2179

https://bugzilla.redhat.com/show_bug.cgi?id=1113630

https://bugzilla.redhat.com/show_bug.cgi?id=1310330

https://bugzilla.redhat.com/show_bug.cgi?id=1589763

https://bugzilla.redhat.com/show_bug.cgi?id=1621421

https://bugzilla.redhat.com/show_bug.cgi?id=1717411

https://bugzilla.redhat.com/show_bug.cgi?id=1766414

https://bugzilla.redhat.com/show_bug.cgi?id=1775145

https://bugzilla.redhat.com/show_bug.cgi?id=1821199

https://bugzilla.redhat.com/show_bug.cgi?id=1845877

https://bugzilla.redhat.com/show_bug.cgi?id=1875363

https://bugzilla.redhat.com/show_bug.cgi?id=1906074

https://bugzilla.redhat.com/show_bug.cgi?id=1910858

https://bugzilla.redhat.com/show_bug.cgi?id=1917718

https://bugzilla.redhat.com/show_bug.cgi?id=1919195

https://bugzilla.redhat.com/show_bug.cgi?id=1919984

https://bugzilla.redhat.com/show_bug.cgi?id=1924610

https://bugzilla.redhat.com/show_bug.cgi?id=1926018

https://bugzilla.redhat.com/show_bug.cgi?id=1926823

https://bugzilla.redhat.com/show_bug.cgi?id=1928158

https://bugzilla.redhat.com/show_bug.cgi?id=1928188

https://bugzilla.redhat.com/show_bug.cgi?id=1928937

https://bugzilla.redhat.com/show_bug.cgi?id=1928954

https://bugzilla.redhat.com/show_bug.cgi?id=1929211

https://bugzilla.redhat.com/show_bug.cgi?id=1930522

https://bugzilla.redhat.com/show_bug.cgi?id=1930565

https://bugzilla.redhat.com/show_bug.cgi?id=1930895

https://bugzilla.redhat.com/show_bug.cgi?id=1932284

https://bugzilla.redhat.com/show_bug.cgi?id=1935073

https://bugzilla.redhat.com/show_bug.cgi?id=1942083

https://bugzilla.redhat.com/show_bug.cgi?id=1943267

https://bugzilla.redhat.com/show_bug.cgi?id=1944723

https://bugzilla.redhat.com/show_bug.cgi?id=1948577

https://bugzilla.redhat.com/show_bug.cgi?id=1949543

https://bugzilla.redhat.com/show_bug.cgi?id=1949547

https://bugzilla.redhat.com/show_bug.cgi?id=1950348

Plugin Details

Severity: High

ID: 150124

File Name: redhat-RHSA-2021-2179.nasl

Version: 1.10

Type: local

Agent: unix

Published: 6/1/2021

Updated: 6/3/2024

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.1

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

CVSS Score Source: CVE-2021-23337

CVSS v3

Risk Factor: High

Base Score: 7.2

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:ovirt-engine-ui-extensions, p-cpe:/a:redhat:enterprise_linux:ovirt-web-ui, cpe:/o:redhat:enterprise_linux:8

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/1/2021

Vulnerability Publication Date: 2/15/2021

Reference Information

CVE: CVE-2020-28500, CVE-2021-23337

CWE: 400, 78

RHSA: 2021:2179