Executive Summary

Summary
Title virt-who security, bug fix, and enhancement update
Informations
Name RHSA-2015:0430 First vendor Publication 2015-03-05
Vendor RedHat Last vendor Modification 2015-03-05
Severity (Vendor) Moderate Revision 01

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:P/I:N/A:N)
Cvss Base Score 2.1 Attack Range Local
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 3.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Problem Description:

An updated virt-who package that fixes one security issue, several bugs, and adds various enhancements is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having Moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Client (v. 7) - noarch Red Hat Enterprise Linux Server (v. 7) - noarch Red Hat Enterprise Linux Workstation (v. 7) - noarch

3. Description:

The virt-who package provides an agent that collects information about virtual guests present in the system and reports them to the subscription manager.

It was discovered that the /etc/sysconfig/virt-who configuration file, which may contain hypervisor authentication credentials, was world-readable. A local user could use this flaw to obtain authentication credentials from this file. (CVE-2014-0189)

Red Hat would like to thank Sal Castiglione for reporting this issue.

The virt-who package has been upgraded to upstream version 0.11, which provides a number of bug fixes and enhancements over the previous version. The most notable bug fixes and enhancements include:

* Support for remote libvirt. * A fix for using encrypted passwords. * Bug fixes and enhancements that increase the stability of virt-who. (BZ#1122489)

This update also fixes the following bugs:

* Prior to this update, the virt-who agent failed to read the list of virtual guests provided by the VDSM daemon. As a consequence, when in VDSM mode, the virt-who agent was not able to send updates about virtual guests to Subscription Asset Manager (SAM) and Red Hat Satellite. With this update, the agent reads the list of guests when in VDSM mode correctly and reports to SAM and Satellite as expected. (BZ#1153405)

* Previously, virt-who used incorrect information when connecting to Red Hat Satellite 5. Consequently, virt-who could not connect to Red Hat Satellite 5 servers. The incorrect parameter has been corrected, and virt-who can now successfully connect to Red Hat Satellite 5. (BZ#1158859)

* Prior to this update, virt-who did not decode the hexadecimal representation of a password before decrypting it. As a consequence, the decrypted password did not match the original password, and attempts to connect using the password failed. virt-who has been updated to decode the encrypted password and, as a result, virt-who now handles storing credentials using encrypted passwords as expected. (BZ#1161607)

In addition, this update adds the following enhancement:

* With this update, virt-who is able to read the list of guests from a remote libvirt hypervisor. (BZ#1127965)

Users of virt-who are advised to upgrade to this updated package, which corrects these issues and adds these enhancements.

4. Solution:

Before applying this update, make sure all previously released errata relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1065421 - Remove dependency on 'libvirt' RPM 1076290 - virt-who creat a null system in SAM server in esx mode 1082981 - Faild to add Hyper-V 2012 to SAM as virt-who communication with Hyper-V failed 1086517 - virt-who failed when testing against Satellite 5.6 due to missing folder /var/lib/virt-who in RHEL 7 1088732 - CVE-2014-0189 virt-who: plaintext hypervisor passwords in world-readable /etc/sysconfig/virt-who configuration file 1098448 - virt-who dies when the system is being unregistered 1122489 - virt-who rebase 1127965 - [RFE] Please add libvirt parameter for using Red Hat Enterprise Linux for Virtual Datacenter in kvm environments. 1153405 - virt-who can't work in the VDSM mode 1158759 - Wrong permission for configuration file /etc/sysconfig/virt-who on rhel7.1 1158803 - Can't display the running mode in the virt-who log 1158859 - virt-who uses wrong server when connecting to satellite 1159187 - "/etc/virt-who.d" hasn't been created by default. 1161434 - Take over one minute to stop/restart virt-who service in ESX mode. 1161607 - virt-who not able to decrypt encrypted password 1162049 - syslog.target depenancy 1163021 - Failed to send host/guest associate to SAM when virt-who run at esx mode 1168111 - [VDSM mode]Failed to send host/guest associate to SAM when there is a vm in the host 1168122 - virt-who incorrectly says that VM is from 'None' hypervisor

Original Source

Url : https://rhn.redhat.com/errata/RHSA-2015-0430.html

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-310 Cryptographic Issues

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1
Os 1
Os 1
Os 1

Nessus® Vulnerability Scanner

Date Description
2015-03-26 Name : The remote Scientific Linux host is missing a security update.
File : sl_20150305_virt_who_on_SL7_x.nasl - Type : ACT_GATHER_INFO
2015-03-18 Name : The remote CentOS host is missing a security update.
File : centos_RHSA-2015-0430.nasl - Type : ACT_GATHER_INFO
2015-03-05 Name : The remote Red Hat host is missing a security update.
File : redhat-RHSA-2015-0430.nasl - Type : ACT_GATHER_INFO
2015-02-16 Name : The remote Fedora host is missing a security update.
File : fedora_2015-1632.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
Date Informations
2015-03-19 13:28:28
  • Multiple Updates
2015-03-06 13:26:05
  • Multiple Updates
2015-03-05 21:22:38
  • First insertion