Wednesday, June 2, 2021

Red Hat Security Advisory 2021-2180-01

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Moderate: RHV Engine and Host Common Packages security update [ovirt-4.4.6]
Advisory ID: RHSA-2021:2180-01
Product: Red Hat Virtualization
Advisory URL: https://access.redhat.com/errata/RHSA-2021:2180
Issue date: 2021-06-01
CVE Names: CVE-2021-20178 CVE-2021-20180 CVE-2021-20191
CVE-2021-20228
====================================================================
1. Summary:

Updated dependency packages for ovirt-engine and ovirt-host that fix
several security flaws, bugs and add various enhancements are now
available.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4 - noarch, x86_64
Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts - noarch, ppc64le, x86_64
Red Hat Virtualization 4 Tools for Red Hat Enterprise Linux 8 - noarch, ppc64le, x86_64

3. Description:

The ovirt-engine package provides the Red Hat Virtualization Manager, a
centralized management platform that allows system administrators to view
and manage virtual machines. The Manager provides a comprehensive range of
features including search capabilities, resource management, live
migrations, and virtual infrastructure provisioning.

Security Fix(es):

* ansible: user data leak in snmp_facts module (CVE-2021-20178)

* ansible module: bitbucket_pipeline_variable exposes secured values
(CVE-2021-20180)

* ansible: multiple modules expose secured values (CVE-2021-20191)

* ansible: basic.py no_log with fallback option (CVE-2021-20228)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the References section.

Bug Fix(es):

* Red Hat Virtualization 4.4.6 now requires Ansible 2.9.18 (BZ#1933672)

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/2974891

5. Bugs fixed (https://bugzilla.redhat.com/):

1914774 - CVE-2021-20178 ansible: user data leak in snmp_facts module
1915808 - CVE-2021-20180 ansible module: bitbucket_pipeline_variable exposes secured values
1916813 - CVE-2021-20191 ansible: multiple modules expose secured values
1924590 - "FIPS mode is not enabled as required" error occur in "Enforce FIPS mode" task when deploying hosted engine
1925002 - CVE-2021-20228 ansible: basic.py no_log with fallback option
1933238 - Allow migration of vms in between the clusters using ansible
1933672 - Ansible security advisory RHSA-2021:0663 not included in RHV

6. Package List:

Red Hat Virtualization 4 Tools for Red Hat Enterprise Linux 8:

Source:
ovirt-ansible-collection-1.4.2-1.el8ev.src.rpm
python-ovirt-engine-sdk4-4.4.12-1.el8ev.src.rpm
rubygem-ovirt-engine-sdk4-4.4.1-1.el8ev.src.rpm

noarch:
ovirt-ansible-collection-1.4.2-1.el8ev.noarch.rpm

ppc64le:
python-ovirt-engine-sdk4-debugsource-4.4.12-1.el8ev.ppc64le.rpm
python3-ovirt-engine-sdk4-4.4.12-1.el8ev.ppc64le.rpm
python3-ovirt-engine-sdk4-debuginfo-4.4.12-1.el8ev.ppc64le.rpm

x86_64:
python-ovirt-engine-sdk4-debugsource-4.4.12-1.el8ev.x86_64.rpm
python3-ovirt-engine-sdk4-4.4.12-1.el8ev.x86_64.rpm
python3-ovirt-engine-sdk4-debuginfo-4.4.12-1.el8ev.x86_64.rpm
rubygem-ovirt-engine-sdk4-4.4.1-1.el8ev.x86_64.rpm
rubygem-ovirt-engine-sdk4-debuginfo-4.4.1-1.el8ev.x86_64.rpm
rubygem-ovirt-engine-sdk4-debugsource-4.4.1-1.el8ev.x86_64.rpm
rubygem-ovirt-engine-sdk4-doc-4.4.1-1.el8ev.x86_64.rpm

Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts:

Source:
ansible-2.9.18-1.el8ae.src.rpm
ovirt-ansible-collection-1.4.2-1.el8ev.src.rpm
python-ovirt-engine-sdk4-4.4.12-1.el8ev.src.rpm

noarch:
ansible-2.9.18-1.el8ae.noarch.rpm
ovirt-ansible-collection-1.4.2-1.el8ev.noarch.rpm

ppc64le:
python-ovirt-engine-sdk4-debugsource-4.4.12-1.el8ev.ppc64le.rpm
python3-ovirt-engine-sdk4-4.4.12-1.el8ev.ppc64le.rpm
python3-ovirt-engine-sdk4-debuginfo-4.4.12-1.el8ev.ppc64le.rpm

x86_64:
python-ovirt-engine-sdk4-debugsource-4.4.12-1.el8ev.x86_64.rpm
python3-ovirt-engine-sdk4-4.4.12-1.el8ev.x86_64.rpm
python3-ovirt-engine-sdk4-debuginfo-4.4.12-1.el8ev.x86_64.rpm

RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4:

Source:
ansible-2.9.18-1.el8ae.src.rpm
ovirt-ansible-collection-1.4.2-1.el8ev.src.rpm
python-ovirt-engine-sdk4-4.4.12-1.el8ev.src.rpm
rubygem-ovirt-engine-sdk4-4.4.1-1.el8ev.src.rpm

noarch:
ansible-2.9.18-1.el8ae.noarch.rpm
ovirt-ansible-collection-1.4.2-1.el8ev.noarch.rpm

x86_64:
python-ovirt-engine-sdk4-debugsource-4.4.12-1.el8ev.x86_64.rpm
python3-ovirt-engine-sdk4-4.4.12-1.el8ev.x86_64.rpm
python3-ovirt-engine-sdk4-debuginfo-4.4.12-1.el8ev.x86_64.rpm
rubygem-ovirt-engine-sdk4-4.4.1-1.el8ev.x86_64.rpm
rubygem-ovirt-engine-sdk4-debuginfo-4.4.1-1.el8ev.x86_64.rpm
rubygem-ovirt-engine-sdk4-debugsource-4.4.1-1.el8ev.x86_64.rpm
rubygem-ovirt-engine-sdk4-doc-4.4.1-1.el8ev.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2021-20178
https://access.redhat.com/security/cve/CVE-2021-20180
https://access.redhat.com/security/cve/CVE-2021-20191
https://access.redhat.com/security/cve/CVE-2021-20228
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <[email protected]>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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OXGH
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
[email protected]
https://listman.redhat.com/mailman/listinfo/rhsa-announce
 

Copyright © 2020 Cyber Details - Vulnerability Database™

Thanks for everything Templateism - You should have written the code a little more complicated