Issued:
2021-07-22
Updated:
2021-07-22

RHSA-2021:2866 - Low: RHV Engine and Host Common Packages security update [ovirt-4.4.7]


Synopsis

Low: RHV Engine and Host Common Packages security update [ovirt-4.4.7]

Type/Severity

Security Advisory Low

Topic

Updated dependency packages for ovirt-engine and ovirt-host that fix several bugs and add various enhancements are now available.

Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The ovirt-engine package provides the Red Hat Virtualization Manager, a centralized management platform that allows system administrators to view and manage virtual machines. The Manager provides a comprehensive range of features including search capabilities, resource management, live migrations, and virtual infrastructure provisioning.

The ovirt-ansible-hosted-engine-setup package provides an Ansible role for deploying Red Hat Virtualization Hosted-Engine.

Security Fix(es):

  • ansible: multiple modules expose secured values (CVE-2021-3447)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • Previously, using an Ansible playbook to fetch virtual machine disk information was slow and incomplete, while the REST API fetched the information faster and more completely. In this release, the Ansible playbook fetches the information completely and quickly. (BZ#1947902)

  • The ovirt-engine in RHV 4.4.7 requires an Ansible 2.9.z version later than Ansible 2.9.20. In addition, in RHV 4.4.7 the version limitation for a specific Ansible version has been removed, the correct Ansible version is now shipped in the RHV subscription channels. (BZ#1966145)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/2974891

Affected Products

ProductVersionArch
Red Hat Virtualization4x86_64
Red Hat Virtualization for IBM Power LE4ppc64le
Red Hat Virtualization Manager4.4x86_64
Red Hat Enterprise Linux for x86_648x86_64
Red Hat Enterprise Linux for Power, little endian8ppc64le

Updated Packages

  • ovirt-imageio-common-2.2.0-1.el8ev.ppc64le.rpm
  • ovirt-openvswitch-devel-2.11-1.el8ev.noarch.rpm
  • ovirt-python-openvswitch-2.11-1.el8ev.noarch.rpm
  • python3-ovirt-engine-sdk4-4.4.13-1.el8ev.ppc64le.rpm
  • ovirt-imageio-daemon-2.2.0-1.el8ev.x86_64.rpm
  • python-ovirt-engine-sdk4-debugsource-4.4.13-1.el8ev.x86_64.rpm
  • ovirt-imageio-common-debuginfo-2.2.0-1.el8ev.ppc64le.rpm
  • ovirt-openvswitch-ovn-host-2.11-1.el8ev.noarch.rpm
  • ovirt-openvswitch-ovn-2.11-1.el8ev.noarch.rpm
  • python-ovirt-engine-sdk4-4.4.13-1.el8ev.src.rpm
  • ovirt-imageio-client-2.2.0-1.el8ev.ppc64le.rpm
  • python-ovirt-engine-sdk4-debugsource-4.4.13-1.el8ev.ppc64le.rpm
  • ovirt-openvswitch-2.11-1.el8ev.src.rpm
  • python3-ovirt-engine-sdk4-4.4.13-1.el8ev.x86_64.rpm
  • ovirt-imageio-common-2.2.0-1.el8ev.x86_64.rpm
  • ovirt-openvswitch-ovn-common-2.11-1.el8ev.noarch.rpm
  • ovirt-imageio-2.2.0-1.el8ev.src.rpm
  • ovirt-openvswitch-2.11-1.el8ev.noarch.rpm
  • python3-ovirt-engine-sdk4-debuginfo-4.4.13-1.el8ev.x86_64.rpm
  • ovirt-imageio-client-2.2.0-1.el8ev.x86_64.rpm
  • ovirt-ansible-collection-1.5.3-1.el8ev.noarch.rpm
  • ovirt-ansible-collection-1.5.3-1.el8ev.src.rpm
  • ovirt-openvswitch-ovn-vtep-2.11-1.el8ev.noarch.rpm
  • ovirt-openvswitch-ovn-central-2.11-1.el8ev.noarch.rpm
  • ovirt-imageio-daemon-2.2.0-1.el8ev.ppc64le.rpm
  • ovirt-imageio-debugsource-2.2.0-1.el8ev.x86_64.rpm
  • ansible-2.9.21-1.el8ae.noarch.rpm
  • ovirt-imageio-common-debuginfo-2.2.0-1.el8ev.x86_64.rpm
  • ansible-2.9.21-1.el8ae.src.rpm
  • ovirt-imageio-debugsource-2.2.0-1.el8ev.ppc64le.rpm
  • python3-ovirt-engine-sdk4-debuginfo-4.4.13-1.el8ev.ppc64le.rpm

Fixes

CVEs

References


Additional information