RHEL 8 : RHV Host (ovirt-host) (RHSA-2022:4764)

medium Nessus Plugin ID 161620

Synopsis

The remote Red Hat host is missing a security update for RHV Host (ovirt-host).

Description

The remote Redhat Enterprise Linux 8 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2022:4764 advisory.

The ovirt-host package consolidates host package requirements into a single meta package.

Security Fix(es) from Bugzilla:

* vdsm: disclosure of sensitive values in log files (CVE-2022-0207)

For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es) from Bugzilla:

* With this release, RHV 4.4 SP1 has been upgraded to use ansible-core in cockpit-ovirt. (BZ#2066042)

* Rebase package(s) to version: 0.16.0

Highlights and notable enhancements: https://github.com/oVirt/cockpit-ovirt/releases/tag/cockpit- ovirt-0.16.0 (BZ#2067078)

* Rebase package(s) to version: 0.6.2 (BZ#2060889)

* Rebase package(s) to version: 4.5.0

Highlights, important fixes, or notable enhancements: (BZ#2054733)

* Feature: Include the package nvme-cli on virtualization hosts

Reason: The package is requested in RHEL 8 Managing Storage devices, Chapter 15. NVMe over fabrics using FC for accessing that hardware

Result: the needed package is available on the host. (BZ#2058177)

* Previously, the ovirt-ha-broker service failed to start on a host with a DISA STIG profile.
In this release, the ovirt-ha-broker binaries were moved to /usr/libexec. As a result, the ovirt-ha-broker service succeeds to start on a host with a DISA STIG profile. (BZ#2050108)

* Previously, during self-hosted engine deployment, the tpgt value was not used in the iSCSI login, creating duplicate iSCSI sessions.
IN this release, the tpgt value is used in the iSCSI login, and no duplicate iSCSI sessions are created.
(BZ#1768969)

* With this release, the self-hosted engine installation supports selecting either DISA STIG or PCI-DSS security profiles for the self-hosted engine VM. (BZ#2029830)

* Red Hat Virtualization 4.4 SP1 now requires ansible-core >= 2.12.0 to execute Ansible playbooks/roles internally from RHV components. (BZ#2052686)

* Rebase package(s) to version: 2.6.1

Highlights, important fixes, or notable enhancements: (BZ#2050512)

* RHV Hypervisor 4.4 SP1, with exception to RHV-H, is able to run on a host with RHEL 8.6 DISA STIG openscap profile applied. (BZ#2015802)

* Previously, SCSI reservation was not set for disks that are hot-plugged.
In this release, the SCSI reservation works for disks that are being hot-plugged. (BZ#2028481)

* The Red Hat Virtualization Host is now capable of running on a machine with the PCI-DSS security profile. (BZ#2030226)

* Previously, if storage problems occurred and disappeared during a VM migration attempt, it sometimes led to the VM being paused and not resuming even if the VM had an auto-resume policy set.
In this release, the VM is handled according to its resume behavior policy when the storage state changes during a VM migration attempt. (BZ#2010478)

* Previously, the VDSM used UDEV links to create the LVM filter. As a result, the LVM sometimes grabbed SCSI devices during the boot process by mistake.
In this release, the LVM does not not try to grab SCSI devices during the boot process, only using the multipath device specified in the LVM filter. (BZ#2016173)

Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the RHEL RHV Host (ovirt-host) package based on the guidance in RHSA-2022:4764.

See Also

http://www.nessus.org/u?052c3112

https://access.redhat.com/security/updates/classification/#low

https://access.redhat.com/errata/RHSA-2022:4764

https://bugzilla.redhat.com/show_bug.cgi?id=1768969

https://bugzilla.redhat.com/show_bug.cgi?id=1787192

https://bugzilla.redhat.com/show_bug.cgi?id=1878724

https://bugzilla.redhat.com/show_bug.cgi?id=1986732

https://bugzilla.redhat.com/show_bug.cgi?id=2010478

https://bugzilla.redhat.com/show_bug.cgi?id=2015802

https://bugzilla.redhat.com/show_bug.cgi?id=2028481

https://bugzilla.redhat.com/show_bug.cgi?id=2029830

https://bugzilla.redhat.com/show_bug.cgi?id=2030226

https://bugzilla.redhat.com/show_bug.cgi?id=2039248

https://bugzilla.redhat.com/show_bug.cgi?id=2050108

https://bugzilla.redhat.com/show_bug.cgi?id=2050512

https://bugzilla.redhat.com/show_bug.cgi?id=2052686

https://bugzilla.redhat.com/show_bug.cgi?id=2054733

https://bugzilla.redhat.com/show_bug.cgi?id=2058177

https://bugzilla.redhat.com/show_bug.cgi?id=2060889

https://bugzilla.redhat.com/show_bug.cgi?id=2066042

https://bugzilla.redhat.com/show_bug.cgi?id=2067078

Plugin Details

Severity: Medium

ID: 161620

File Name: redhat-RHSA-2022-4764.nasl

Version: 1.11

Type: local

Agent: unix

Published: 5/27/2022

Updated: 11/7/2024

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

Vendor

Vendor Severity: Low

CVSS v2

Risk Factor: Low

Base Score: 3.8

Temporal Score: 2.8

Vector: CVSS2#AV:L/AC:H/Au:S/C:C/I:N/A:N

CVSS Score Source: CVE-2022-0207

CVSS v3

Risk Factor: Medium

Base Score: 4.7

Temporal Score: 4.1

Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:vdsm-api, p-cpe:/a:redhat:enterprise_linux:vdsm-python, p-cpe:/a:redhat:enterprise_linux:vdsm-hook-openstacknet, p-cpe:/a:redhat:enterprise_linux:vdsm-jsonrpc, p-cpe:/a:redhat:enterprise_linux:vdsm-hook-fcoe, p-cpe:/a:redhat:enterprise_linux:vdsm-hook-cpuflags, cpe:/o:redhat:enterprise_linux:8, p-cpe:/a:redhat:enterprise_linux:vdsm-hook-ethtool-options, p-cpe:/a:redhat:enterprise_linux:vdsm-gluster, p-cpe:/a:redhat:enterprise_linux:vdsm-hook-nestedvt, p-cpe:/a:redhat:enterprise_linux:vdsm, p-cpe:/a:redhat:enterprise_linux:vdsm-client, p-cpe:/a:redhat:enterprise_linux:vdsm-hook-vhostmd, p-cpe:/a:redhat:enterprise_linux:vdsm-yajsonrpc, p-cpe:/a:redhat:enterprise_linux:vdsm-hook-localdisk, cpe:/o:redhat:enterprise_linux:7, p-cpe:/a:redhat:enterprise_linux:vdsm-hook-extra-ipv4-addrs, p-cpe:/a:redhat:enterprise_linux:vdsm-http, p-cpe:/a:redhat:enterprise_linux:vdsm-network, p-cpe:/a:redhat:enterprise_linux:vdsm-common, p-cpe:/a:redhat:enterprise_linux:vdsm-hook-checkips

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 5/26/2022

Vulnerability Publication Date: 5/26/2022

Reference Information

CVE: CVE-2022-0207

CWE: 362

RHSA: 2022:4764