RHEL 8 : Red Hat Virtualization Host security update [ovirt-4.4.9] 0-day (Important) (RHSA-2021:4750)

critical Nessus Plugin ID 155654

Synopsis

The remote Red Hat host is missing one or more security updates for Red Hat Virtualization Host.

Description

The remote Redhat Enterprise Linux 8 host has a package installed that is affected by multiple vulnerabilities as referenced in the RHSA-2021:4750 advisory.

The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks.

Security Fix(es):

* kernel: out-of-bounds write due to a heap buffer overflow in __hidinput_change_resolution_multipliers() of hid-input.c (CVE-2021-0512)

* Ansible: ansible-connection module discloses sensitive info in traceback error message (CVE-2021-3620)

* kernel: Insufficient validation of user-supplied sizes for the MSG_CRYPTO message type (CVE-2021-43267)

* libssh: NULL pointer dereference in sftpserver.c if ssh_buffer_new returns NULL (CVE-2020-16135)

For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* Red Hat Virtualization Host now includes packages from Red Hat Enterprise Linux 8.5. (BZ#1958101)

* Red Hat Virtualization Host now includes packages from RHGS-3.5.z on RHEL-8 Batch #5. (BZ#1975175)

* Red Hat Virtualization Host now includes the packages needed for using Managed Block Devices via cinderlib. (BZ#1983021)

* Red Hat Virtualization Host now includes openvswitch related packages from Fast Data Path 21.G release.
(BZ#1998104)

* Previously it was not possible to upgrade RHVH to version 4.4.8 when custom VDSM hooks were installed on RHVH. This was caused by the VDSM hooks dependency on the concrete version of VDSM. The current release allows users to maintain the VDSM dependency manually. In other words, if you want to upgrade from VDSM X.Y.Z to version A.B.C, you must upgrade all VDSM hooks to the same A.B.C version. (BZ#2004469)

Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the RHEL Red Hat Virtualization Host package based on the guidance in RHSA-2021:4750.

See Also

http://www.nessus.org/u?b560bd3b

https://access.redhat.com/security/updates/classification/#important

https://access.redhat.com/errata/RHSA-2021:4750

https://bugzilla.redhat.com/show_bug.cgi?id=1862456

https://bugzilla.redhat.com/show_bug.cgi?id=1953685

https://bugzilla.redhat.com/show_bug.cgi?id=1958101

https://bugzilla.redhat.com/show_bug.cgi?id=1974491

https://bugzilla.redhat.com/show_bug.cgi?id=1975175

https://bugzilla.redhat.com/show_bug.cgi?id=1975767

https://bugzilla.redhat.com/show_bug.cgi?id=1983021

https://bugzilla.redhat.com/show_bug.cgi?id=1998104

https://bugzilla.redhat.com/show_bug.cgi?id=2004469

https://bugzilla.redhat.com/show_bug.cgi?id=2020362

https://bugzilla.redhat.com/show_bug.cgi?id=2024360

Plugin Details

Severity: Critical

ID: 155654

File Name: redhat-RHSA-2021-4750.nasl

Version: 1.8

Type: local

Agent: unix

Published: 11/20/2021

Updated: 11/7/2024

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.9

Vendor

Vendor Severity: Important

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2021-43267

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:redhat-virtualization-host-image-update, cpe:/o:redhat:enterprise_linux:8, p-cpe:/a:redhat:enterprise_linux:redhat-virtualization-host

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 11/19/2021

Vulnerability Publication Date: 7/29/2020

Reference Information

CVE: CVE-2020-16135, CVE-2021-0512, CVE-2021-3620, CVE-2021-43267

CWE: 20, 209, 476, 787

RHSA: 2021:4750