First published: Tue May 14 2019(Updated: )
During HE deployment via cockpit-ovirt, cockpit-ovirt generates an ansible variable file `/var/lib/ovirt-hosted-engine-setup/cockpit/ansibleVarFileXXXXXX.var` which contains the admin and the appliance passwords as plain-text. At the of the deployment procedure, these files are deleted.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/cockpit-ovirt | <0:0.13.5-1.el7e | 0:0.13.5-1.el7e |
redhat/imgbased | <0:1.1.9-0.1.el7e | 0:1.1.9-0.1.el7e |
redhat/ovirt-node-ng | <0:4.3.5-0.20190717.0.el7e | 0:4.3.5-0.20190717.0.el7e |
redhat/redhat-release-virtualization-host | <0:4.3.5-2.el7e | 0:4.3.5-2.el7e |
redhat/redhat-virtualization-host | <0:4.3.5-20190722.0.el7_7 | 0:4.3.5-20190722.0.el7_7 |
oVirt |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10139 is a vulnerability during HE deployment via cockpit-ovirt, where cockpit-ovirt generates an ansible variable file containing plain-text admin and appliance passwords.
CVE-2019-10139 affects cockpit-ovirt version 0.13.5-1.el7e and earlier.
CVE-2019-10139 has a severity rating of 7.8 (High).
To fix CVE-2019-10139, upgrade to cockpit-ovirt version 0.13.5-1.el7e or later.
You can find more information about CVE-2019-10139 at the following references: - [Red Hat Bugzilla](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1703678) - [Red Hat Security Advisory](https://access.redhat.com/errata/RHSA-2019:2433) - [Red Hat Security Advisory](https://access.redhat.com/errata/RHSA-2019:2437)