First published: Tue Jun 26 2018(Updated: )
ovirt-engine before version ovirt 4.2.2 is vulnerable to an information exposure through log files. When engine-backup was run with one of the options "--provision*db", the database username and password were logged in cleartext. Sharing the provisioning log might inadvertently leak database passwords.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ovirt Ovirt | <4.2.2 | |
Redhat Enterprise Virtualization Manager | =4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-1072 is critical with a score of 9.8.
ovirt-engine version up to exclusive 4.2.2 and Redhat Enterprise Virtualization Manager version 4.2 are affected by CVE-2018-1072.
CVE-2018-1072 exposes information through log files.
To fix CVE-2018-1072, update ovirt-engine to version 4.2.2 or later, and update Redhat Enterprise Virtualization Manager to version 4.2.
You can find more information about CVE-2018-1072 in the following references: [Red Hat Security Advisory](https://access.redhat.com/errata/RHSA-2018:2071) and [Bugzilla](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1072).