First published: Tue Feb 06 2018(Updated: )
A flaw was found in ovirt-engine. When engine-setup is run and one chooses to provision the database manually or connect to a remote database, the password input is logged but filtered only later, after verification that it is correct. References: <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED CURRENTRELEASE - logs are world-readable" href="show_bug.cgi?id=1540622">https://bugzilla.redhat.com/show_bug.cgi?id=1540622</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ovirt Ovirt | <4.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1075 is a vulnerability in ovirt-engine up to version 4.2.3 that allows an unfiltered password to be logged in cleartext during the verification step of manual database provisioning.
CVE-2018-1075 has a severity score of 7.8 (high).
ovirt-engine up to version 4.2.3 is affected by CVE-2018-1075.
To fix CVE-2018-1075, upgrade to a version of ovirt-engine that is higher than 4.2.3.
Yes, you can find references for CVE-2018-1075 at the following links: [Red Hat Security Advisory](https://access.redhat.com/errata/RHSA-2018:2071), [Red Hat Bugzilla](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1075), and [ovirt Gerrit](https://gerrit.ovirt.org/#/c/91653/).