-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: Red Hat Virtualization security, bug fix, and enhancement update [ovirt-4.5.0]
Advisory ID:       RHSA-2022:4896-01
Product:           Red Hat Virtualization
Advisory URL:      https://access.redhat.com/errata/RHSA-2022:4896
Issue date:        2022-06-03
CVE Names:         CVE-2018-25032 CVE-2021-4028 CVE-2021-4083 
                   CVE-2022-0778 CVE-2022-1271 CVE-2022-24903 
                   CVE-2022-25636 
=====================================================================

1. Summary:

An update for imgbased, redhat-release-virtualization-host, and
redhat-virtualization-host is now available for Red Hat Virtualization 4
for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

RHEL 8-based RHEV-H for RHEV 4 (build requirements) - noarch, x86_64
Red Hat Virtualization 4 Hypervisor for RHEL 8 - x86_64

3. Description:

The redhat-virtualization-host packages provide the Red Hat Virtualization
Host. These packages include redhat-release-virtualization-host,
ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are
installed using a special build of Red Hat Enterprise Linux with only the
packages required to host virtual machines. RHVH features a Cockpit user
interface for monitoring the host's resources and performing administrative
tasks.

Security Fix(es):

* kernel: use-after-free in RDMA listen() (CVE-2021-4028)

* kernel: fget: check that the fd still exists after getting a ref to it
(CVE-2021-4083)

* kernel: heap out of bounds write in nf_dup_netdev.c (CVE-2022-25636)

* openssl: Infinite loop in BN_mod_sqrt() reachable when parsing
certificates (CVE-2022-0778)

* zlib: A flaw found in zlib when compressing (not decompressing) certain
inputs (CVE-2018-25032)

* gzip: arbitrary-file-write vulnerability (CVE-2022-1271)

* rsyslog: Heap-based overflow in TCP syslog server (CVE-2022-24903)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Bug Fixes:

* elfutils package has been update within RHV-H Channel to match the same
version released in RHEL (BZ#2038081)

* Rebase package(s) to version 1.2.24
For highlights, important fixes, or notable enhancements: see bugs in
"Depend On". (BZ#2057338)

* Rebase package(s) to version: 4.5.0

Highlights, important fixes, or notable enhancements: (BZ#2057342)

* Rebase package(s) to version anaconda-33.16.6.6-1.el8
For highlights and important bug fixes: include UI change for blocking
installation if root password is not set. (BZ#1899821)

* Red hat Virtualization Host has been rebased on Red Hat Enterprise Linux
8.6 (BZ#1997074)

* Previously, concurrent executions of LV refresh (lvchange) failed. This
hindered simultaneous starts of virtual machines that have thin-provisioned
disks based on the same disk on a block storage domain.
In this release, concurrent execution of LV refresh has been fixed in LVM2.
(BZ#2020497)

* Red Hat Virtualization Host has been rebased on latest Ceph 4.3
(BZ#2090138)

* In previous releases systemtap package could have been installed on top
of RHV-H from RHV-H channel. With 4.4 SP1 systemtap package installation is
not supported anymore (BZ#2052963)

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/2974891

5. Bugs fixed (https://bugzilla.redhat.com/):

1899821 - RHVH 4.4.3 anaconda UI proceeds to begin installation without root password provided
1997074 - Rebase RHV-H on RHEL 8.6
2020497 - Need to include lvm2-2.03.14-1.el8
2027201 - CVE-2021-4028 kernel: use-after-free in RDMA listen()
2029923 - CVE-2021-4083 kernel: fget: check that the fd still exists after getting a ref to it
2038081 - Upgrade elfutils to elfutils-0.186-1.el8
2052963 - [DOC] systemtap support dropped in RHV-H 4.4 SP1
2056334 - [RHVH-4.5.0] On UEFI machines, RHVH enters emergency mode when upgraded to 4.5.0
2056745 - sssd-ad can't be installed due to missing deps libsss_idmap
2056830 - CVE-2022-25636 kernel: heap out of bounds write in nf_dup_netdev.c
2057338 - Upgrade imgbased to 1.2.24
2057342 - Upgrade redhat-release-virtualization-host to 4.5.0
2062202 - CVE-2022-0778 openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates
2067945 - CVE-2018-25032 zlib: A flaw found in zlib when compressing (not decompressing) certain inputs
2073310 - CVE-2022-1271 gzip: arbitrary-file-write vulnerability
2081353 - CVE-2022-24903 rsyslog: Heap-based overflow in TCP syslog server
2086834 - Cannot install sssd daemon needed for AD Authentication
2090138 - Rebase RHV-H on Ceph 4.3

6. Package List:

Red Hat Virtualization 4 Hypervisor for RHEL 8:

Source:
elfutils-0.186-1.el8.src.rpm
redhat-virtualization-host-4.5.0-202205291010_8.6.src.rpm

x86_64:
elfutils-debuginfo-0.186-1.el8.x86_64.rpm
elfutils-debuginfod-client-0.186-1.el8.x86_64.rpm
elfutils-debuginfod-client-debuginfo-0.186-1.el8.x86_64.rpm
elfutils-debuginfod-debuginfo-0.186-1.el8.x86_64.rpm
elfutils-debugsource-0.186-1.el8.x86_64.rpm
elfutils-devel-0.186-1.el8.x86_64.rpm
elfutils-libelf-debuginfo-0.186-1.el8.x86_64.rpm
elfutils-libs-debuginfo-0.186-1.el8.x86_64.rpm
redhat-virtualization-host-image-update-4.5.0-202205291010_8.6.x86_64.rpm

RHEL 8-based RHEV-H for RHEV 4 (build requirements):

Source:
imgbased-1.2.24-1.el8ev.src.rpm
ovirt-node-ng-4.4.2-1.el8ev.src.rpm
redhat-release-virtualization-host-4.5.0-5.el8ev.src.rpm
redhat-virtualization-host-productimg-4.5.0-2.el8.src.rpm

noarch:
imgbased-1.2.24-1.el8ev.noarch.rpm
ovirt-node-ng-nodectl-4.4.2-1.el8ev.noarch.rpm
python3-imgbased-1.2.24-1.el8ev.noarch.rpm
python3-ovirt-node-ng-nodectl-4.4.2-1.el8ev.noarch.rpm
redhat-virtualization-host-image-update-placeholder-4.5.0-5.el8ev.noarch.rpm

x86_64:
redhat-release-virtualization-host-4.5.0-5.el8ev.x86_64.rpm
redhat-release-virtualization-host-content-4.5.0-5.el8ev.x86_64.rpm
redhat-virtualization-host-productimg-4.5.0-2.el8.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2018-25032
https://access.redhat.com/security/cve/CVE-2021-4028
https://access.redhat.com/security/cve/CVE-2021-4083
https://access.redhat.com/security/cve/CVE-2022-0778
https://access.redhat.com/security/cve/CVE-2022-1271
https://access.redhat.com/security/cve/CVE-2022-24903
https://access.redhat.com/security/cve/CVE-2022-25636
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=fz0l
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
[email protected]
https://listman.redhat.com/mailman/listinfo/rhsa-announce