First published: Sun Jul 13 2014(Updated: )
Red Hat Enterprise Virtualization Manager is a visual tool for centrally<br>managing collections of virtual servers running Red Hat Enterprise Linux<br>and Microsoft Windows. This package also includes the Red Hat Enterprise<br>Virtualization Manager API, a set of scriptable commands that give<br>administrators the ability to perform queries and operations on Red Hat<br>Enterprise Virtualization Manager.<br>The Manager is a JBoss Application Server application that provides several<br>interfaces through which the virtual environment can be accessed and<br>interacted with, including an Administration Portal, a User Portal, and a<br>Representational State Transfer (REST) Application Programming Interface<br>(API).<br>It was discovered that the HttpClient incorrectly extracted the host name<br>from an X.509 certificate subject's Common Name (CN) field.<br>A man-in-the-middle attacker could use this flaw to spoof an SSL server<br>using a specially crafted X.509 certificate. (CVE-2012-6153, CVE-2014-3577)<br>A Cross-Site Request Forgery (CSRF) flaw was found in the oVirt REST API.<br>A remote attacker could provide a specially crafted web page that, when<br>visited by a user with a valid REST API session, would allow the attacker<br>to trigger calls to the oVirt REST API. (CVE-2014-0151)<br>It was found that the oVirt web admin interface did not include the<br>HttpOnly flag when setting session IDs with the Set-Cookie header.<br>This flaw could make it is easier for a remote attacker to hijack an oVirt<br>web admin session by leveraging a cross-site scripting (XSS) vulnerability.<br>(CVE-2014-0154)<br>The CVE-2012-6153 issue was discovered by Florian Weimer of Red Hat<br>Product Security.<br>These updated Red Hat Enterprise Virtualization Manager packages also<br>include numerous bug fixes and various enhancements. Space precludes<br>documenting all of these changes in this advisory. Users are directed to<br>the Red Hat Enterprise Virtualization 3.5 Manager Release Notes document,<br>linked to in the References, for information on the most significant of<br>these changes.<br>All Red Hat Enterprise Virtualization Manager users are advised to upgrade<br>to these updated packages, which resolve these issues and add these<br>enhancements.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rhevm | <3.5.0-0.29.el6e | 3.5.0-0.29.el6e |
redhat/rhevm-backend | <3.5.0-0.29.el6e | 3.5.0-0.29.el6e |
redhat/rhevm-dbscripts | <3.5.0-0.29.el6e | 3.5.0-0.29.el6e |
redhat/rhevm-extensions-api-impl | <3.5.0-0.29.el6e | 3.5.0-0.29.el6e |
redhat/rhevm-extensions-api-impl-javadoc | <3.5.0-0.29.el6e | 3.5.0-0.29.el6e |
redhat/rhevm-lib | <3.5.0-0.29.el6e | 3.5.0-0.29.el6e |
redhat/rhevm-restapi | <3.5.0-0.29.el6e | 3.5.0-0.29.el6e |
redhat/rhevm-setup | <3.5.0-0.29.el6e | 3.5.0-0.29.el6e |
redhat/rhevm-setup-base | <3.5.0-0.29.el6e | 3.5.0-0.29.el6e |
redhat/rhevm-setup-plugin-allinone | <3.5.0-0.29.el6e | 3.5.0-0.29.el6e |
redhat/rhevm-setup-plugin-ovirt-engine | <3.5.0-0.29.el6e | 3.5.0-0.29.el6e |
redhat/rhevm-setup-plugin-ovirt-engine-common | <3.5.0-0.29.el6e | 3.5.0-0.29.el6e |
redhat/rhevm-setup-plugin-websocket-proxy | <3.5.0-0.29.el6e | 3.5.0-0.29.el6e |
redhat/rhevm-tools | <3.5.0-0.29.el6e | 3.5.0-0.29.el6e |
redhat/rhevm-userportal | <3.5.0-0.29.el6e | 3.5.0-0.29.el6e |
redhat/rhevm-webadmin-portal | <3.5.0-0.29.el6e | 3.5.0-0.29.el6e |
redhat/rhevm-websocket-proxy | <3.5.0-0.29.el6e | 3.5.0-0.29.el6e |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2015:0158 is classified as important.
To fix RHSA-2015:0158, you should update the affected packages to version 3.5.0-0.29.el6e or later.
The affected packages include rhevm, rhevm-backend, rhevm-lib, and several other components of the Red Hat Enterprise Virtualization Manager.
RHSA-2015:0158 addresses vulnerabilities that could allow unauthorized access or manipulation of your virtual environment.
While updating is the recommended action, temporarily restricting access to the affected services may mitigate risks until the updates can be applied.