Hash: SHA1

             AUSCERT External Security Bulletin Redistribution

             Moderate: rhevm 3.1.2 security and bug fix update
                              5 February 2013


        AusCERT Security Bulletin Summary

Product:           rhevm
Publisher:         Red Hat
Operating System:  Red Hat Enterprise Linux Server 6
Impact/Access:     Administrator Compromise -- Existing Account
                   Denial of Service        -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2013-0168 CVE-2012-6115 

Original Bulletin: 

- --------------------------BEGIN INCLUDED TEXT--------------------

Hash: SHA1

                   Red Hat Security Advisory

Synopsis:          Moderate: rhevm 3.1.2 security and bug fix update
Advisory ID:       RHSA-2013:0211-01
Product:           Red Hat Enterprise Virtualization
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2013-0211.html
Issue date:        2013-02-04
CVE Names:         CVE-2012-6115 CVE-2013-0168 

1. Summary:

Updated rhevm packages that fix two security issues and various bugs are
now available.

The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

2. Relevant releases/architectures:

RHEV-M 3.1 - noarch

3. Description:

The Red Hat Enterprise Virtualization Manager is a centralized management
platform that allows system administrators to view and manage virtual
machines. The Red Hat Enterprise Virtualization Manager provides a
comprehensive range of features including search capabilities, resource
management, live migrations, and virtual infrastructure provisioning. The
Manager is a JBoss Application Server application that provides several
interfaces through which the virtual environment can be accessed and
interacted with, including an Administration Portal, a User Portal, and a
Representational State Transfer (REST) Application Programming Interface

It was discovered that running the domain management tool with the validate
action ("rhevm-manage-domains -action=validate") logged administrative
passwords to a world-readable log file. A local attacker could use this
flaw to gain control of systems that are managed by Red Hat Enterprise
Virtualization Manager. (CVE-2012-6115)

A flaw was found in the way the MoveDisk command checked permissions on the
target storage domain. A privileged user (a storage admin of a storage
domain) could use this flaw to exhaust all available free space in another
storage domain they would otherwise not have access to. (CVE-2013-0168)

The CVE-2012-6115 issue was discovered by Andrew Cathrow of Red Hat. The
CVE-2013-0168 issue was discovered by Ondrej Machacek of Red Hat.

Previously, upgrading from Red Hat Enterprise Virtualization Manager 3.0 to
3.1 was not formally supported by Red Hat. This update fixes a number of
known issues with the upgrade process. As a result, upgrading from Red Hat
Enterprise Virtualization Manager 3.0 to 3.1 is now supported.

For more information on upgrading to Red Hat Enterprise Virtualization
Manager 3.1, consult the Installation Guide:


Additional tips and considerations to take into account are also available
in the Red Hat Knowledgebase:


Information on the bugs fixed in this update is available in the Technical
Notes document:


All Red Hat Enterprise Virtualization Manager administrators are advised to
install these updated packages, which fix these issues.

4. Solution:

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at

5. Bugs fixed (http://bugzilla.redhat.com/):

842134 - [Storage] cannot force extend block storage domains (no force extendVG support)
854214 - engine: logging - when domain is partially inaccessible event log does not report which luns are inaccessible
881059 - RESTAPI: RSDL does not document lun-based disks parameters for add()
881121 - [es_ES] heading "Virtual size" is truncated in Spanish [LAYOUT]
881783 - ovrit-engine-backend:.rollbackQuota ignores disabled quota
883893 - [ja_JP] Test case failure: Host Tab [LAYOUT] - "no network assigned" translation doesn't fit a single line
883896 - [ja_JP] Test case failure: Storage Tab: General sub-tab: unnecessary colon (":") between "Used: xxxxGB" line and NFS Export Path
883903 - [es_ES] Event Tab, Advance view 's heading Event is truncated [LAYOUT]
883910 - [ja_JP] Test case failure: Disk Tab: Remove Disk(s) dialog: "[disk-alias] is Bootable and Attached to [n] VM(s)" message structure need to be revised.
883915 - Portal Login button label is not localized
883933 - [zh_CN] Truncation column name on logical networks sub tab [LAYOUT]
886166 - Backend: CPU pinning works only with single-digit CPU's
886520 - Create ISCSI LUN Disk: Connection details should be mandatory
886654 - [ja_JP] Test case failure: Check the message for Alert/Events/Tasks: The Date part of the message contains minutes in the month-section.
887856 - [ja_JP] Test case failure: Virtual Machines [LAYOUT]: New VM dialog -> Resrouce Allocation section -> string "clone" is broken into two lines
887904 - [rhevm-upgrade] during upgrade rhev-guest-tools-iso is not updated to latest version and remains with old version
888039 - Failed Hot-Plug and Hot-UnPlug Direct LUN in FC DC environment
888309 - Importing a VM from an OVF without the diskAlias property with copyCollapse=false will not auto-generate disk aliases
888317 - [engine] [upgrade] Unable to perform operations as user on existing VM after upgrade from RHEV 3.0 to 3.1
888785 - [RHEVM Web Admin Portal localization] Zanata source strings (rhevm-3.1 version) containing "oVirt" and "Engine"
889792 - 'Configure Local Disk' does not work properly in Japanese environment
891631 - rhevm-upgrade must check for enough disk space to perform an upgrade before starting the upgrade
893355 - CVE-2013-0168 rhev-m: insufficient MoveDisk target domain permission checks
902341 - [User Portal] An user with UserRole assigned to a pool does not see pool's VMs
905865 - CVE-2012-6115 rhev: rhevm-manage-domains logs admin passwords

6. Package List:

RHEV-M 3.1:



These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from

7. References:


8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2013 Red Hat, Inc.
Version: GnuPG v1.4.4 (GNU/Linux)


- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:


Australian Computer Emergency Response Team
The University of Queensland
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
Comment: http://www.auscert.org.au/render.html?it=1967