Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2017-15113 (GCVE-0-2017-15113)
Vulnerability from cvelistv5 – Published: 2018-07-27 16:00 – Updated: 2024-08-05 19:50| URL | Tags |
|---|---|
| https://gerrit.ovirt.org/gitweb?p=ovirt-engine.gi… | x_refsource_CONFIRM |
| http://www.securityfocus.com/bid/101933 | vdb-entryx_refsource_BID |
| https://access.redhat.com/errata/RHEA-2017:3138 | vendor-advisoryx_refsource_REDHAT |
| https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2… | x_refsource_CONFIRM |
| Vendor | Product | Version | |
|---|---|---|---|
| Red Hat | ovirt-engine |
Affected:
4.1.7.6
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T19:50:15.567Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://gerrit.ovirt.org/gitweb?p=ovirt-engine.git%3Ba=commitdiff%3Bh=f4a5d0cc772127dbfe40789e26c4633ceea07d14%3Bhp=e6e8704ac9eb115624ff66e2965877d8e63a45f4"
},
{
"name": "101933",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/101933"
},
{
"name": "RHEA-2017:3138",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHEA-2017:3138"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15113"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "ovirt-engine",
"vendor": "Red Hat",
"versions": [
{
"status": "affected",
"version": "4.1.7.6"
}
]
}
],
"datePublic": "2017-11-12T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "ovirt-engine before version 4.1.7.6 with log level set to DEBUG includes passwords in the log file without masking. Only administrators can change the log level and only administrators can access the logs. This presents a risk when debug-level logs are shared with vendors or other parties to troubleshoot issues."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-212",
"description": "CWE-212",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-07-28T09:57:01.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://gerrit.ovirt.org/gitweb?p=ovirt-engine.git%3Ba=commitdiff%3Bh=f4a5d0cc772127dbfe40789e26c4633ceea07d14%3Bhp=e6e8704ac9eb115624ff66e2965877d8e63a45f4"
},
{
"name": "101933",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/101933"
},
{
"name": "RHEA-2017:3138",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHEA-2017:3138"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15113"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2017-15113",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "ovirt-engine",
"version": {
"version_data": [
{
"version_value": "4.1.7.6"
}
]
}
}
]
},
"vendor_name": "Red Hat"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "ovirt-engine before version 4.1.7.6 with log level set to DEBUG includes passwords in the log file without masking. Only administrators can change the log level and only administrators can access the logs. This presents a risk when debug-level logs are shared with vendors or other parties to troubleshoot issues."
}
]
},
"impact": {
"cvss": [
[
{
"vectorString": "7.2/CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
}
]
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-212"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://gerrit.ovirt.org/gitweb?p=ovirt-engine.git;a=commitdiff;h=f4a5d0cc772127dbfe40789e26c4633ceea07d14;hp=e6e8704ac9eb115624ff66e2965877d8e63a45f4",
"refsource": "CONFIRM",
"url": "https://gerrit.ovirt.org/gitweb?p=ovirt-engine.git;a=commitdiff;h=f4a5d0cc772127dbfe40789e26c4633ceea07d14;hp=e6e8704ac9eb115624ff66e2965877d8e63a45f4"
},
{
"name": "101933",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/101933"
},
{
"name": "RHEA-2017:3138",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHEA-2017:3138"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15113",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15113"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2017-15113",
"datePublished": "2018-07-27T16:00:00.000Z",
"dateReserved": "2017-10-08T00:00:00.000Z",
"dateUpdated": "2024-08-05T19:50:15.567Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2017-15113",
"date": "2026-05-13",
"epss": "0.00344",
"percentile": "0.57018"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ovirt:ovirt:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.1.7.6\", \"matchCriteriaId\": \"C58D385B-4DE1-4290-8FFA-C294D8875483\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:virtualization:4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"03EB0F63-DB24-4240-BC44-C92BAE7EAF42\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"ovirt-engine before version 4.1.7.6 with log level set to DEBUG includes passwords in the log file without masking. Only administrators can change the log level and only administrators can access the logs. This presents a risk when debug-level logs are shared with vendors or other parties to troubleshoot issues.\"}, {\"lang\": \"es\", \"value\": \"ovirt-engine en versiones anteriores a la 4.1.7.6 con el nivel de registro configurado en DEBUG incluye contrase\\u00f1as en el archivo de registro sin enmascarar. Solo los administradores pueden cambiar el nivel de registro y solo los administradores pueden acceder a los registros. Esto presenta un riesgo cuando los registros de nivel de depuraci\\u00f3n se comparten con proveedores u otras partes para solucionar problemas.\"}]",
"id": "CVE-2017-15113",
"lastModified": "2024-11-21T03:14:05.920",
"metrics": "{\"cvssMetricV30\": [{\"source\": \"secalert@redhat.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H\", \"baseScore\": 7.2, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 0.6, \"impactScore\": 6.0}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 6.6, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 0.7, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:S/C:P/I:N/A:N\", \"baseScore\": 3.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"LOW\", \"exploitabilityScore\": 6.8, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2018-07-27T16:29:00.303",
"references": "[{\"url\": \"http://www.securityfocus.com/bid/101933\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://access.redhat.com/errata/RHEA-2017:3138\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15113\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Issue Tracking\", \"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://gerrit.ovirt.org/gitweb?p=ovirt-engine.git%3Ba=commitdiff%3Bh=f4a5d0cc772127dbfe40789e26c4633ceea07d14%3Bhp=e6e8704ac9eb115624ff66e2965877d8e63a45f4\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/bid/101933\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://access.redhat.com/errata/RHEA-2017:3138\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15113\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://gerrit.ovirt.org/gitweb?p=ovirt-engine.git%3Ba=commitdiff%3Bh=f4a5d0cc772127dbfe40789e26c4633ceea07d14%3Bhp=e6e8704ac9eb115624ff66e2965877d8e63a45f4\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"secalert@redhat.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-212\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-532\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2017-15113\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2018-07-27T16:29:00.303\",\"lastModified\":\"2024-11-21T03:14:05.920\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"ovirt-engine before version 4.1.7.6 with log level set to DEBUG includes passwords in the log file without masking. Only administrators can change the log level and only administrators can access the logs. This presents a risk when debug-level logs are shared with vendors or other parties to troubleshoot issues.\"},{\"lang\":\"es\",\"value\":\"ovirt-engine en versiones anteriores a la 4.1.7.6 con el nivel de registro configurado en DEBUG incluye contrase\u00f1as en el archivo de registro sin enmascarar. Solo los administradores pueden cambiar el nivel de registro y solo los administradores pueden acceder a los registros. Esto presenta un riesgo cuando los registros de nivel de depuraci\u00f3n se comparten con proveedores u otras partes para solucionar problemas.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H\",\"baseScore\":7.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.6,\"impactScore\":6.0},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.6,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.7,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:S/C:P/I:N/A:N\",\"baseScore\":3.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":6.8,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-212\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-532\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ovirt:ovirt:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.1.7.6\",\"matchCriteriaId\":\"C58D385B-4DE1-4290-8FFA-C294D8875483\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:virtualization:4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03EB0F63-DB24-4240-BC44-C92BAE7EAF42\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/101933\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHEA-2017:3138\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15113\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://gerrit.ovirt.org/gitweb?p=ovirt-engine.git%3Ba=commitdiff%3Bh=f4a5d0cc772127dbfe40789e26c4633ceea07d14%3Bhp=e6e8704ac9eb115624ff66e2965877d8e63a45f4\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/101933\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHEA-2017:3138\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15113\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://gerrit.ovirt.org/gitweb?p=ovirt-engine.git%3Ba=commitdiff%3Bh=f4a5d0cc772127dbfe40789e26c4633ceea07d14%3Bhp=e6e8704ac9eb115624ff66e2965877d8e63a45f4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
RHEA-2017:3138
Vulnerability from csaf_redhat - Published: 2017-11-07 00:00 - Updated: 2025-11-21 17:24ovirt-engine before version 4.1.7.6 with log level set to DEBUG includes passwords in the log file without masking. Only administrators can change the log level and only administrators can access the logs. This presents a risk when debug-level logs are shared with vendors or other parties to troubleshoot issues.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Server-RHV-S-4.1:ovirt-engine-0:4.1.7.6-0.1.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHV-S-4.1:ovirt-engine-0:4.1.7.6-0.1.el7.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHV-S-4.1:ovirt-engine-backend-0:4.1.7.6-0.1.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHV-S-4.1:ovirt-engine-dbscripts-0:4.1.7.6-0.1.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHV-S-4.1:ovirt-engine-extensions-api-impl-0:4.1.7.6-0.1.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHV-S-4.1:ovirt-engine-extensions-api-impl-javadoc-0:4.1.7.6-0.1.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHV-S-4.1:ovirt-engine-lib-0:4.1.7.6-0.1.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHV-S-4.1:ovirt-engine-restapi-0:4.1.7.6-0.1.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHV-S-4.1:ovirt-engine-setup-0:4.1.7.6-0.1.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHV-S-4.1:ovirt-engine-setup-base-0:4.1.7.6-0.1.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHV-S-4.1:ovirt-engine-setup-plugin-ovirt-engine-0:4.1.7.6-0.1.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHV-S-4.1:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.1.7.6-0.1.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHV-S-4.1:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.1.7.6-0.1.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHV-S-4.1:ovirt-engine-setup-plugin-websocket-proxy-0:4.1.7.6-0.1.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHV-S-4.1:ovirt-engine-tools-0:4.1.7.6-0.1.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHV-S-4.1:ovirt-engine-tools-backup-0:4.1.7.6-0.1.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHV-S-4.1:ovirt-engine-userportal-0:4.1.7.6-0.1.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHV-S-4.1:ovirt-engine-vmconsole-proxy-helper-0:4.1.7.6-0.1.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHV-S-4.1:ovirt-engine-webadmin-portal-0:4.1.7.6-0.1.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHV-S-4.1:ovirt-engine-websocket-proxy-0:4.1.7.6-0.1.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHV-S-4.1:rhevm-0:4.1.7.6-0.1.el7.noarch | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Virtualization Manager.",
"title": "Topic"
},
{
"category": "general",
"text": "The Red Hat Virtualization Manager is a centralized management platform that allows system administrators to view and manage virtual machines. The Manager provides a comprehensive range of features including search capabilities, resource management, live migrations, and virtual infrastructure provisioning.\n\nThe Manager is a JBoss Application Server application that provides several interfaces for accessing and interacting with the virtual environment, including an Administration Portal, a User Portal, and a Representational State Transfer (REST) Application Programming Interface (API).\n\nChanges to the ovirt-engine component:\n\n* This update fixes a Manager issue that allowed duplicate MAC addresses even when duplicates are disallowed. (BZ#1485688)\n\n* The precision of rx_rate, tx_rate, rx_drop, and tx_drop of virtual and host network interfaces have been increased. Network traffic 100 times smaller can now be detected on network interface statistics.\n\nIf traffic on the network interface is below the precision of the network interface statistics, it is not reflected in the statistics. (BZ#1502510)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHEA-2017:3138",
"url": "https://access.redhat.com/errata/RHEA-2017:3138"
},
{
"category": "external",
"summary": "1485688",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1485688"
},
{
"category": "external",
"summary": "1487981",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487981"
},
{
"category": "external",
"summary": "1489677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1489677"
},
{
"category": "external",
"summary": "1490089",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490089"
},
{
"category": "external",
"summary": "1494916",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1494916"
},
{
"category": "external",
"summary": "1495163",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495163"
},
{
"category": "external",
"summary": "1496399",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1496399"
},
{
"category": "external",
"summary": "1496681",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1496681"
},
{
"category": "external",
"summary": "1498478",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1498478"
},
{
"category": "external",
"summary": "1502510",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1502510"
},
{
"category": "external",
"summary": "1507315",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1507315"
},
{
"category": "external",
"summary": "1507316",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1507316"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhea-2017_3138.json"
}
],
"title": "Red Hat Enhancement Advisory: Red Hat Virtualization Manager (ovirt-engine) 4.1.7",
"tracking": {
"current_release_date": "2025-11-21T17:24:08+00:00",
"generator": {
"date": "2025-11-21T17:24:08+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHEA-2017:3138",
"initial_release_date": "2017-11-07T00:00:00+00:00",
"revision_history": [
{
"date": "2017-11-07T00:00:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2017-11-07T17:22:33+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:24:08+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Virtualization Manager 4.1",
"product": {
"name": "Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhev_manager:4"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "ovirt-engine-extensions-api-impl-javadoc-0:4.1.7.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-extensions-api-impl-javadoc-0:4.1.7.6-0.1.el7.noarch",
"product_id": "ovirt-engine-extensions-api-impl-javadoc-0:4.1.7.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-extensions-api-impl-javadoc@4.1.7.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-backend-0:4.1.7.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-backend-0:4.1.7.6-0.1.el7.noarch",
"product_id": "ovirt-engine-backend-0:4.1.7.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-backend@4.1.7.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.1.7.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.1.7.6-0.1.el7.noarch",
"product_id": "ovirt-engine-setup-plugin-ovirt-engine-0:4.1.7.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-ovirt-engine@4.1.7.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.1.7.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.1.7.6-0.1.el7.noarch",
"product_id": "ovirt-engine-setup-plugin-websocket-proxy-0:4.1.7.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-websocket-proxy@4.1.7.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-websocket-proxy-0:4.1.7.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-websocket-proxy-0:4.1.7.6-0.1.el7.noarch",
"product_id": "ovirt-engine-websocket-proxy-0:4.1.7.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-websocket-proxy@4.1.7.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-tools-0:4.1.7.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-tools-0:4.1.7.6-0.1.el7.noarch",
"product_id": "ovirt-engine-tools-0:4.1.7.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-tools@4.1.7.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-lib-0:4.1.7.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-lib-0:4.1.7.6-0.1.el7.noarch",
"product_id": "ovirt-engine-lib-0:4.1.7.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-lib@4.1.7.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-tools-backup-0:4.1.7.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-tools-backup-0:4.1.7.6-0.1.el7.noarch",
"product_id": "ovirt-engine-tools-backup-0:4.1.7.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-tools-backup@4.1.7.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-userportal-0:4.1.7.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-userportal-0:4.1.7.6-0.1.el7.noarch",
"product_id": "ovirt-engine-userportal-0:4.1.7.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-userportal@4.1.7.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-webadmin-portal-0:4.1.7.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-webadmin-portal-0:4.1.7.6-0.1.el7.noarch",
"product_id": "ovirt-engine-webadmin-portal-0:4.1.7.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-webadmin-portal@4.1.7.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-vmconsole-proxy-helper-0:4.1.7.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-vmconsole-proxy-helper-0:4.1.7.6-0.1.el7.noarch",
"product_id": "ovirt-engine-vmconsole-proxy-helper-0:4.1.7.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-vmconsole-proxy-helper@4.1.7.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.1.7.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.1.7.6-0.1.el7.noarch",
"product_id": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.1.7.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-vmconsole-proxy-helper@4.1.7.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.1.7.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.1.7.6-0.1.el7.noarch",
"product_id": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.1.7.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-ovirt-engine-common@4.1.7.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-0:4.1.7.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-setup-0:4.1.7.6-0.1.el7.noarch",
"product_id": "ovirt-engine-setup-0:4.1.7.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup@4.1.7.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-extensions-api-impl-0:4.1.7.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-extensions-api-impl-0:4.1.7.6-0.1.el7.noarch",
"product_id": "ovirt-engine-extensions-api-impl-0:4.1.7.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-extensions-api-impl@4.1.7.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhevm-0:4.1.7.6-0.1.el7.noarch",
"product": {
"name": "rhevm-0:4.1.7.6-0.1.el7.noarch",
"product_id": "rhevm-0:4.1.7.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm@4.1.7.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-restapi-0:4.1.7.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-restapi-0:4.1.7.6-0.1.el7.noarch",
"product_id": "ovirt-engine-restapi-0:4.1.7.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-restapi@4.1.7.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-dbscripts-0:4.1.7.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-dbscripts-0:4.1.7.6-0.1.el7.noarch",
"product_id": "ovirt-engine-dbscripts-0:4.1.7.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-dbscripts@4.1.7.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-0:4.1.7.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-0:4.1.7.6-0.1.el7.noarch",
"product_id": "ovirt-engine-0:4.1.7.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine@4.1.7.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-base-0:4.1.7.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-setup-base-0:4.1.7.6-0.1.el7.noarch",
"product_id": "ovirt-engine-setup-base-0:4.1.7.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-base@4.1.7.6-0.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "ovirt-engine-0:4.1.7.6-0.1.el7.src",
"product": {
"name": "ovirt-engine-0:4.1.7.6-0.1.el7.src",
"product_id": "ovirt-engine-0:4.1.7.6-0.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine@4.1.7.6-0.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-0:4.1.7.6-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-0:4.1.7.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-0:4.1.7.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-0:4.1.7.6-0.1.el7.src as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-0:4.1.7.6-0.1.el7.src"
},
"product_reference": "ovirt-engine-0:4.1.7.6-0.1.el7.src",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-backend-0:4.1.7.6-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-backend-0:4.1.7.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-backend-0:4.1.7.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-dbscripts-0:4.1.7.6-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-dbscripts-0:4.1.7.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-dbscripts-0:4.1.7.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-extensions-api-impl-0:4.1.7.6-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-extensions-api-impl-0:4.1.7.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-extensions-api-impl-0:4.1.7.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-extensions-api-impl-javadoc-0:4.1.7.6-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-extensions-api-impl-javadoc-0:4.1.7.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-extensions-api-impl-javadoc-0:4.1.7.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-lib-0:4.1.7.6-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-lib-0:4.1.7.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-lib-0:4.1.7.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-restapi-0:4.1.7.6-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-restapi-0:4.1.7.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-restapi-0:4.1.7.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-0:4.1.7.6-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-setup-0:4.1.7.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-setup-0:4.1.7.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-base-0:4.1.7.6-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-setup-base-0:4.1.7.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-setup-base-0:4.1.7.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.1.7.6-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-setup-plugin-ovirt-engine-0:4.1.7.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-ovirt-engine-0:4.1.7.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.1.7.6-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.1.7.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.1.7.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.1.7.6-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.1.7.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.1.7.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.1.7.6-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-setup-plugin-websocket-proxy-0:4.1.7.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-websocket-proxy-0:4.1.7.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-tools-0:4.1.7.6-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-tools-0:4.1.7.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-tools-0:4.1.7.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-tools-backup-0:4.1.7.6-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-tools-backup-0:4.1.7.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-tools-backup-0:4.1.7.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-userportal-0:4.1.7.6-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-userportal-0:4.1.7.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-userportal-0:4.1.7.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-vmconsole-proxy-helper-0:4.1.7.6-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-vmconsole-proxy-helper-0:4.1.7.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-vmconsole-proxy-helper-0:4.1.7.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-webadmin-portal-0:4.1.7.6-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-webadmin-portal-0:4.1.7.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-webadmin-portal-0:4.1.7.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-websocket-proxy-0:4.1.7.6-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-websocket-proxy-0:4.1.7.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-websocket-proxy-0:4.1.7.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-0:4.1.7.6-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:rhevm-0:4.1.7.6-0.1.el7.noarch"
},
"product_reference": "rhevm-0:4.1.7.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jiri Belka"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2017-15113",
"cwe": {
"id": "CWE-212",
"name": "Improper Removal of Sensitive Information Before Storage or Transfer"
},
"discovery_date": "2017-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1512365"
}
],
"notes": [
{
"category": "description",
"text": "ovirt-engine before version 4.1.7.6 with log level set to DEBUG includes passwords in the log file without masking. Only administrators can change the log level and only administrators can access the logs. This presents a risk when debug-level logs are shared with vendors or other parties to troubleshoot issues.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ovirt-engine: DEBUG logging includes unmasked passwords",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHV-S-4.1:ovirt-engine-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-0:4.1.7.6-0.1.el7.src",
"7Server-RHV-S-4.1:ovirt-engine-backend-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-dbscripts-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-extensions-api-impl-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-extensions-api-impl-javadoc-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-lib-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-restapi-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-base-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-plugin-ovirt-engine-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-plugin-websocket-proxy-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-tools-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-tools-backup-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-userportal-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-vmconsole-proxy-helper-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-webadmin-portal-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-websocket-proxy-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:rhevm-0:4.1.7.6-0.1.el7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-15113"
},
{
"category": "external",
"summary": "RHBZ#1512365",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1512365"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-15113",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15113"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-15113",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15113"
}
],
"release_date": "2017-11-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-11-07T00:00:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHV-S-4.1:ovirt-engine-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-0:4.1.7.6-0.1.el7.src",
"7Server-RHV-S-4.1:ovirt-engine-backend-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-dbscripts-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-extensions-api-impl-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-extensions-api-impl-javadoc-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-lib-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-restapi-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-base-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-plugin-ovirt-engine-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-plugin-websocket-proxy-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-tools-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-tools-backup-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-userportal-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-vmconsole-proxy-helper-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-webadmin-portal-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-websocket-proxy-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:rhevm-0:4.1.7.6-0.1.el7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHEA-2017:3138"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RHV-S-4.1:ovirt-engine-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-0:4.1.7.6-0.1.el7.src",
"7Server-RHV-S-4.1:ovirt-engine-backend-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-dbscripts-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-extensions-api-impl-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-extensions-api-impl-javadoc-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-lib-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-restapi-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-base-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-plugin-ovirt-engine-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-plugin-websocket-proxy-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-tools-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-tools-backup-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-userportal-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-vmconsole-proxy-helper-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-webadmin-portal-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-websocket-proxy-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:rhevm-0:4.1.7.6-0.1.el7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ovirt-engine: DEBUG logging includes unmasked passwords"
}
]
}
RHEA-2017_3138
Vulnerability from csaf_redhat - Published: 2017-11-07 00:00 - Updated: 2024-11-14 21:41ovirt-engine before version 4.1.7.6 with log level set to DEBUG includes passwords in the log file without masking. Only administrators can change the log level and only administrators can access the logs. This presents a risk when debug-level logs are shared with vendors or other parties to troubleshoot issues.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Server-RHV-S-4.1:ovirt-engine-0:4.1.7.6-0.1.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHV-S-4.1:ovirt-engine-0:4.1.7.6-0.1.el7.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHV-S-4.1:ovirt-engine-backend-0:4.1.7.6-0.1.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHV-S-4.1:ovirt-engine-dbscripts-0:4.1.7.6-0.1.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHV-S-4.1:ovirt-engine-extensions-api-impl-0:4.1.7.6-0.1.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHV-S-4.1:ovirt-engine-extensions-api-impl-javadoc-0:4.1.7.6-0.1.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHV-S-4.1:ovirt-engine-lib-0:4.1.7.6-0.1.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHV-S-4.1:ovirt-engine-restapi-0:4.1.7.6-0.1.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHV-S-4.1:ovirt-engine-setup-0:4.1.7.6-0.1.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHV-S-4.1:ovirt-engine-setup-base-0:4.1.7.6-0.1.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHV-S-4.1:ovirt-engine-setup-plugin-ovirt-engine-0:4.1.7.6-0.1.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHV-S-4.1:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.1.7.6-0.1.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHV-S-4.1:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.1.7.6-0.1.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHV-S-4.1:ovirt-engine-setup-plugin-websocket-proxy-0:4.1.7.6-0.1.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHV-S-4.1:ovirt-engine-tools-0:4.1.7.6-0.1.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHV-S-4.1:ovirt-engine-tools-backup-0:4.1.7.6-0.1.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHV-S-4.1:ovirt-engine-userportal-0:4.1.7.6-0.1.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHV-S-4.1:ovirt-engine-vmconsole-proxy-helper-0:4.1.7.6-0.1.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHV-S-4.1:ovirt-engine-webadmin-portal-0:4.1.7.6-0.1.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHV-S-4.1:ovirt-engine-websocket-proxy-0:4.1.7.6-0.1.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHV-S-4.1:rhevm-0:4.1.7.6-0.1.el7.noarch | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Virtualization Manager.",
"title": "Topic"
},
{
"category": "general",
"text": "The Red Hat Virtualization Manager is a centralized management platform that allows system administrators to view and manage virtual machines. The Manager provides a comprehensive range of features including search capabilities, resource management, live migrations, and virtual infrastructure provisioning.\n\nThe Manager is a JBoss Application Server application that provides several interfaces for accessing and interacting with the virtual environment, including an Administration Portal, a User Portal, and a Representational State Transfer (REST) Application Programming Interface (API).\n\nChanges to the ovirt-engine component:\n\n* This update fixes a Manager issue that allowed duplicate MAC addresses even when duplicates are disallowed. (BZ#1485688)\n\n* The precision of rx_rate, tx_rate, rx_drop, and tx_drop of virtual and host network interfaces have been increased. Network traffic 100 times smaller can now be detected on network interface statistics.\n\nIf traffic on the network interface is below the precision of the network interface statistics, it is not reflected in the statistics. (BZ#1502510)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHEA-2017:3138",
"url": "https://access.redhat.com/errata/RHEA-2017:3138"
},
{
"category": "external",
"summary": "1485688",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1485688"
},
{
"category": "external",
"summary": "1487981",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487981"
},
{
"category": "external",
"summary": "1489677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1489677"
},
{
"category": "external",
"summary": "1490089",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490089"
},
{
"category": "external",
"summary": "1494916",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1494916"
},
{
"category": "external",
"summary": "1495163",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495163"
},
{
"category": "external",
"summary": "1496399",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1496399"
},
{
"category": "external",
"summary": "1496681",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1496681"
},
{
"category": "external",
"summary": "1498478",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1498478"
},
{
"category": "external",
"summary": "1502510",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1502510"
},
{
"category": "external",
"summary": "1507315",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1507315"
},
{
"category": "external",
"summary": "1507316",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1507316"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhea-2017_3138.json"
}
],
"title": "Red Hat Enhancement Advisory: Red Hat Virtualization Manager (ovirt-engine) 4.1.7",
"tracking": {
"current_release_date": "2024-11-14T21:41:00+00:00",
"generator": {
"date": "2024-11-14T21:41:00+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHEA-2017:3138",
"initial_release_date": "2017-11-07T00:00:00+00:00",
"revision_history": [
{
"date": "2017-11-07T00:00:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2017-11-07T17:22:33+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T21:41:00+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Virtualization Manager 4.1",
"product": {
"name": "Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhev_manager:4"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "ovirt-engine-extensions-api-impl-javadoc-0:4.1.7.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-extensions-api-impl-javadoc-0:4.1.7.6-0.1.el7.noarch",
"product_id": "ovirt-engine-extensions-api-impl-javadoc-0:4.1.7.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-extensions-api-impl-javadoc@4.1.7.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-backend-0:4.1.7.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-backend-0:4.1.7.6-0.1.el7.noarch",
"product_id": "ovirt-engine-backend-0:4.1.7.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-backend@4.1.7.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.1.7.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.1.7.6-0.1.el7.noarch",
"product_id": "ovirt-engine-setup-plugin-ovirt-engine-0:4.1.7.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-ovirt-engine@4.1.7.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.1.7.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.1.7.6-0.1.el7.noarch",
"product_id": "ovirt-engine-setup-plugin-websocket-proxy-0:4.1.7.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-websocket-proxy@4.1.7.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-websocket-proxy-0:4.1.7.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-websocket-proxy-0:4.1.7.6-0.1.el7.noarch",
"product_id": "ovirt-engine-websocket-proxy-0:4.1.7.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-websocket-proxy@4.1.7.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-tools-0:4.1.7.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-tools-0:4.1.7.6-0.1.el7.noarch",
"product_id": "ovirt-engine-tools-0:4.1.7.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-tools@4.1.7.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-lib-0:4.1.7.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-lib-0:4.1.7.6-0.1.el7.noarch",
"product_id": "ovirt-engine-lib-0:4.1.7.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-lib@4.1.7.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-tools-backup-0:4.1.7.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-tools-backup-0:4.1.7.6-0.1.el7.noarch",
"product_id": "ovirt-engine-tools-backup-0:4.1.7.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-tools-backup@4.1.7.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-userportal-0:4.1.7.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-userportal-0:4.1.7.6-0.1.el7.noarch",
"product_id": "ovirt-engine-userportal-0:4.1.7.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-userportal@4.1.7.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-webadmin-portal-0:4.1.7.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-webadmin-portal-0:4.1.7.6-0.1.el7.noarch",
"product_id": "ovirt-engine-webadmin-portal-0:4.1.7.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-webadmin-portal@4.1.7.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-vmconsole-proxy-helper-0:4.1.7.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-vmconsole-proxy-helper-0:4.1.7.6-0.1.el7.noarch",
"product_id": "ovirt-engine-vmconsole-proxy-helper-0:4.1.7.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-vmconsole-proxy-helper@4.1.7.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.1.7.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.1.7.6-0.1.el7.noarch",
"product_id": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.1.7.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-vmconsole-proxy-helper@4.1.7.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.1.7.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.1.7.6-0.1.el7.noarch",
"product_id": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.1.7.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-ovirt-engine-common@4.1.7.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-0:4.1.7.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-setup-0:4.1.7.6-0.1.el7.noarch",
"product_id": "ovirt-engine-setup-0:4.1.7.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup@4.1.7.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-extensions-api-impl-0:4.1.7.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-extensions-api-impl-0:4.1.7.6-0.1.el7.noarch",
"product_id": "ovirt-engine-extensions-api-impl-0:4.1.7.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-extensions-api-impl@4.1.7.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhevm-0:4.1.7.6-0.1.el7.noarch",
"product": {
"name": "rhevm-0:4.1.7.6-0.1.el7.noarch",
"product_id": "rhevm-0:4.1.7.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm@4.1.7.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-restapi-0:4.1.7.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-restapi-0:4.1.7.6-0.1.el7.noarch",
"product_id": "ovirt-engine-restapi-0:4.1.7.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-restapi@4.1.7.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-dbscripts-0:4.1.7.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-dbscripts-0:4.1.7.6-0.1.el7.noarch",
"product_id": "ovirt-engine-dbscripts-0:4.1.7.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-dbscripts@4.1.7.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-0:4.1.7.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-0:4.1.7.6-0.1.el7.noarch",
"product_id": "ovirt-engine-0:4.1.7.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine@4.1.7.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-base-0:4.1.7.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-setup-base-0:4.1.7.6-0.1.el7.noarch",
"product_id": "ovirt-engine-setup-base-0:4.1.7.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-base@4.1.7.6-0.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "ovirt-engine-0:4.1.7.6-0.1.el7.src",
"product": {
"name": "ovirt-engine-0:4.1.7.6-0.1.el7.src",
"product_id": "ovirt-engine-0:4.1.7.6-0.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine@4.1.7.6-0.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-0:4.1.7.6-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-0:4.1.7.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-0:4.1.7.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-0:4.1.7.6-0.1.el7.src as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-0:4.1.7.6-0.1.el7.src"
},
"product_reference": "ovirt-engine-0:4.1.7.6-0.1.el7.src",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-backend-0:4.1.7.6-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-backend-0:4.1.7.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-backend-0:4.1.7.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-dbscripts-0:4.1.7.6-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-dbscripts-0:4.1.7.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-dbscripts-0:4.1.7.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-extensions-api-impl-0:4.1.7.6-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-extensions-api-impl-0:4.1.7.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-extensions-api-impl-0:4.1.7.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-extensions-api-impl-javadoc-0:4.1.7.6-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-extensions-api-impl-javadoc-0:4.1.7.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-extensions-api-impl-javadoc-0:4.1.7.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-lib-0:4.1.7.6-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-lib-0:4.1.7.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-lib-0:4.1.7.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-restapi-0:4.1.7.6-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-restapi-0:4.1.7.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-restapi-0:4.1.7.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-0:4.1.7.6-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-setup-0:4.1.7.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-setup-0:4.1.7.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-base-0:4.1.7.6-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-setup-base-0:4.1.7.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-setup-base-0:4.1.7.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.1.7.6-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-setup-plugin-ovirt-engine-0:4.1.7.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-ovirt-engine-0:4.1.7.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.1.7.6-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.1.7.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.1.7.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.1.7.6-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.1.7.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.1.7.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.1.7.6-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-setup-plugin-websocket-proxy-0:4.1.7.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-websocket-proxy-0:4.1.7.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-tools-0:4.1.7.6-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-tools-0:4.1.7.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-tools-0:4.1.7.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-tools-backup-0:4.1.7.6-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-tools-backup-0:4.1.7.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-tools-backup-0:4.1.7.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-userportal-0:4.1.7.6-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-userportal-0:4.1.7.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-userportal-0:4.1.7.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-vmconsole-proxy-helper-0:4.1.7.6-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-vmconsole-proxy-helper-0:4.1.7.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-vmconsole-proxy-helper-0:4.1.7.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-webadmin-portal-0:4.1.7.6-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-webadmin-portal-0:4.1.7.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-webadmin-portal-0:4.1.7.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-websocket-proxy-0:4.1.7.6-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:ovirt-engine-websocket-proxy-0:4.1.7.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-websocket-proxy-0:4.1.7.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-0:4.1.7.6-0.1.el7.noarch as a component of Red Hat Virtualization Manager 4.1",
"product_id": "7Server-RHV-S-4.1:rhevm-0:4.1.7.6-0.1.el7.noarch"
},
"product_reference": "rhevm-0:4.1.7.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.1"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jiri Belka"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2017-15113",
"cwe": {
"id": "CWE-212",
"name": "Improper Removal of Sensitive Information Before Storage or Transfer"
},
"discovery_date": "2017-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1512365"
}
],
"notes": [
{
"category": "description",
"text": "ovirt-engine before version 4.1.7.6 with log level set to DEBUG includes passwords in the log file without masking. Only administrators can change the log level and only administrators can access the logs. This presents a risk when debug-level logs are shared with vendors or other parties to troubleshoot issues.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ovirt-engine: DEBUG logging includes unmasked passwords",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHV-S-4.1:ovirt-engine-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-0:4.1.7.6-0.1.el7.src",
"7Server-RHV-S-4.1:ovirt-engine-backend-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-dbscripts-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-extensions-api-impl-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-extensions-api-impl-javadoc-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-lib-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-restapi-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-base-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-plugin-ovirt-engine-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-plugin-websocket-proxy-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-tools-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-tools-backup-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-userportal-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-vmconsole-proxy-helper-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-webadmin-portal-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-websocket-proxy-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:rhevm-0:4.1.7.6-0.1.el7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-15113"
},
{
"category": "external",
"summary": "RHBZ#1512365",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1512365"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-15113",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15113"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-15113",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15113"
}
],
"release_date": "2017-11-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-11-07T00:00:00+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHV-S-4.1:ovirt-engine-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-0:4.1.7.6-0.1.el7.src",
"7Server-RHV-S-4.1:ovirt-engine-backend-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-dbscripts-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-extensions-api-impl-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-extensions-api-impl-javadoc-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-lib-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-restapi-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-base-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-plugin-ovirt-engine-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-plugin-websocket-proxy-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-tools-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-tools-backup-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-userportal-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-vmconsole-proxy-helper-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-webadmin-portal-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-websocket-proxy-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:rhevm-0:4.1.7.6-0.1.el7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHEA-2017:3138"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RHV-S-4.1:ovirt-engine-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-0:4.1.7.6-0.1.el7.src",
"7Server-RHV-S-4.1:ovirt-engine-backend-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-dbscripts-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-extensions-api-impl-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-extensions-api-impl-javadoc-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-lib-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-restapi-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-base-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-plugin-ovirt-engine-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-setup-plugin-websocket-proxy-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-tools-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-tools-backup-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-userportal-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-vmconsole-proxy-helper-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-webadmin-portal-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:ovirt-engine-websocket-proxy-0:4.1.7.6-0.1.el7.noarch",
"7Server-RHV-S-4.1:rhevm-0:4.1.7.6-0.1.el7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ovirt-engine: DEBUG logging includes unmasked passwords"
}
]
}
CNVD-2017-38353
Vulnerability from cnvd - Published: 2017-12-28目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://access.redhat.com/errata/RHEA-2017:3138
| Name | Red Hat oVirt Engine |
|---|
{
"bids": {
"bid": {
"bidNumber": "101933"
}
},
"cves": {
"cve": {
"cveNumber": "CVE-2017-15113"
}
},
"description": "Red Hat oVirt Engine\u662f\u7f8e\u56fd\u7ea2\u5e3d\uff08Red Hat\uff09\u516c\u53f8\u7684\u4e00\u5957\u5f00\u6e90\u7684\u865a\u62df\u5316\u7ba1\u7406\u5e73\u53f0\uff0c\u662fRHEV\uff08\u4f01\u4e1a\u865a\u62df\u5316\u5e73\u53f0\uff09\u7684\u5f00\u6e90\u7248\u672c\uff0c\u7531ovirt-node\u5ba2\u6237\u7aef\u548covert-engine\u7ba1\u7406\u7aef\u7ec4\u6210\u3002\r\n\r\nRed Hat oVirt Engine\u4e2d\u5b58\u5728\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\u3002\u672c\u5730\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u83b7\u53d6\u654f\u611f\u4fe1\u606f\u3002",
"discovererName": "Jiri Belka",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://access.redhat.com/errata/RHEA-2017:3138",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2017-38353",
"openTime": "2017-12-28",
"patchDescription": "Red Hat oVirt Engine\u662f\u7f8e\u56fd\u7ea2\u5e3d\uff08Red Hat\uff09\u516c\u53f8\u7684\u4e00\u5957\u5f00\u6e90\u7684\u865a\u62df\u5316\u7ba1\u7406\u5e73\u53f0\uff0c\u662fRHEV\uff08\u4f01\u4e1a\u865a\u62df\u5316\u5e73\u53f0\uff09\u7684\u5f00\u6e90\u7248\u672c\uff0c\u7531ovirt-node\u5ba2\u6237\u7aef\u548covert-engine\u7ba1\u7406\u7aef\u7ec4\u6210\u3002\r\n\r\nRed Hat oVirt Engine\u4e2d\u5b58\u5728\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\u3002\u672c\u5730\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u83b7\u53d6\u654f\u611f\u4fe1\u606f\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Red Hat oVirt Engine\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\uff08CNVD-2017-38353\uff09\u7684\u8865\u4e01",
"products": {
"product": "Red Hat oVirt Engine"
},
"referenceLink": "http://www.securityfocus.com/bid/101933",
"serverity": "\u4f4e",
"submitTime": "2017-11-28",
"title": "Red Hat oVirt Engine\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\uff08CNVD-2017-38353\uff09"
}
GHSA-M833-87VF-576C
Vulnerability from github – Published: 2022-05-13 01:37 – Updated: 2023-08-18 21:25ovirt-engine before version 4.1.7.6 with log level set to DEBUG includes passwords in the log file without masking. Only administrators can change the log level and only administrators can access the logs. This presents a risk when debug-level logs are shared with vendors or other parties to troubleshoot issues.
{
"affected": [
{
"package": {
"ecosystem": "Maven",
"name": "org.ovirt.engine.sdk:ovirt-engine-sdk-java"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.1.7.6"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2017-15113"
],
"database_specific": {
"cwe_ids": [
"CWE-532"
],
"github_reviewed": true,
"github_reviewed_at": "2023-07-25T22:33:08Z",
"nvd_published_at": "2018-07-27T16:29:00Z",
"severity": "MODERATE"
},
"details": "ovirt-engine before version 4.1.7.6 with log level set to DEBUG includes passwords in the log file without masking. Only administrators can change the log level and only administrators can access the logs. This presents a risk when debug-level logs are shared with vendors or other parties to troubleshoot issues.",
"id": "GHSA-m833-87vf-576c",
"modified": "2023-08-18T21:25:10Z",
"published": "2022-05-13T01:37:34Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15113"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHEA-2017:3138"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15113"
},
{
"type": "WEB",
"url": "https://gerrit.ovirt.org/gitweb?p=ovirt-engine.git;a=commitdiff;h=f4a5d0cc772127dbfe40789e26c4633ceea07d14;hp=e6e8704ac9eb115624ff66e2965877d8e63a45f4"
},
{
"type": "PACKAGE",
"url": "https://github.com/oVirt/ovirt-engine"
},
{
"type": "WEB",
"url": "https://web.archive.org/web/20210124121521/https://www.securityfocus.com/bid/101933"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "ovirt-engine Logs Plaintext Passwords To File",
"withdrawn": "2023-08-18T21:25:10Z"
}
GSD-2017-15113
Vulnerability from gsd - Updated: 2023-12-13 01:20{
"GSD": {
"alias": "CVE-2017-15113",
"description": "ovirt-engine before version 4.1.7.6 with log level set to DEBUG includes passwords in the log file without masking. Only administrators can change the log level and only administrators can access the logs. This presents a risk when debug-level logs are shared with vendors or other parties to troubleshoot issues.",
"id": "GSD-2017-15113",
"references": [
"https://access.redhat.com/errata/RHEA-2017:3138"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2017-15113"
],
"details": "ovirt-engine before version 4.1.7.6 with log level set to DEBUG includes passwords in the log file without masking. Only administrators can change the log level and only administrators can access the logs. This presents a risk when debug-level logs are shared with vendors or other parties to troubleshoot issues.",
"id": "GSD-2017-15113",
"modified": "2023-12-13T01:20:59.054955Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2017-15113",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "ovirt-engine",
"version": {
"version_data": [
{
"version_value": "4.1.7.6"
}
]
}
}
]
},
"vendor_name": "Red Hat"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "ovirt-engine before version 4.1.7.6 with log level set to DEBUG includes passwords in the log file without masking. Only administrators can change the log level and only administrators can access the logs. This presents a risk when debug-level logs are shared with vendors or other parties to troubleshoot issues."
}
]
},
"impact": {
"cvss": [
[
{
"vectorString": "7.2/CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
}
]
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-212"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://gerrit.ovirt.org/gitweb?p=ovirt-engine.git;a=commitdiff;h=f4a5d0cc772127dbfe40789e26c4633ceea07d14;hp=e6e8704ac9eb115624ff66e2965877d8e63a45f4",
"refsource": "CONFIRM",
"url": "https://gerrit.ovirt.org/gitweb?p=ovirt-engine.git;a=commitdiff;h=f4a5d0cc772127dbfe40789e26c4633ceea07d14;hp=e6e8704ac9eb115624ff66e2965877d8e63a45f4"
},
{
"name": "101933",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/101933"
},
{
"name": "RHEA-2017:3138",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHEA-2017:3138"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15113",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15113"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:ovirt:ovirt:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "4.1.7.6",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:redhat:virtualization:4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2017-15113"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "ovirt-engine before version 4.1.7.6 with log level set to DEBUG includes passwords in the log file without masking. Only administrators can change the log level and only administrators can access the logs. This presents a risk when debug-level logs are shared with vendors or other parties to troubleshoot issues."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-532"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://gerrit.ovirt.org/gitweb?p=ovirt-engine.git;a=commitdiff;h=f4a5d0cc772127dbfe40789e26c4633ceea07d14;hp=e6e8704ac9eb115624ff66e2965877d8e63a45f4",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://gerrit.ovirt.org/gitweb?p=ovirt-engine.git;a=commitdiff;h=f4a5d0cc772127dbfe40789e26c4633ceea07d14;hp=e6e8704ac9eb115624ff66e2965877d8e63a45f4"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15113",
"refsource": "CONFIRM",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15113"
},
{
"name": "RHEA-2017:3138",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHEA-2017:3138"
},
{
"name": "101933",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/101933"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 0.7,
"impactScore": 5.9
}
},
"lastModifiedDate": "2019-10-09T23:24Z",
"publishedDate": "2018-07-27T16:29Z"
}
}
}
FKIE_CVE-2017-15113
Vulnerability from fkie_nvd - Published: 2018-07-27 16:29 - Updated: 2024-11-21 03:146.6 (Medium) - CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
| Vendor | Product | Version | |
|---|---|---|---|
| ovirt | ovirt | * | |
| redhat | virtualization | 4.1 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ovirt:ovirt:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C58D385B-4DE1-4290-8FFA-C294D8875483",
"versionEndExcluding": "4.1.7.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:virtualization:4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "03EB0F63-DB24-4240-BC44-C92BAE7EAF42",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ovirt-engine before version 4.1.7.6 with log level set to DEBUG includes passwords in the log file without masking. Only administrators can change the log level and only administrators can access the logs. This presents a risk when debug-level logs are shared with vendors or other parties to troubleshoot issues."
},
{
"lang": "es",
"value": "ovirt-engine en versiones anteriores a la 4.1.7.6 con el nivel de registro configurado en DEBUG incluye contrase\u00f1as en el archivo de registro sin enmascarar. Solo los administradores pueden cambiar el nivel de registro y solo los administradores pueden acceder a los registros. Esto presenta un riesgo cuando los registros de nivel de depuraci\u00f3n se comparten con proveedores u otras partes para solucionar problemas."
}
],
"id": "CVE-2017-15113",
"lastModified": "2024-11-21T03:14:05.920",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 0.6,
"impactScore": 6.0,
"source": "secalert@redhat.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 0.7,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2018-07-27T16:29:00.303",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/101933"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHEA-2017:3138"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15113"
},
{
"source": "secalert@redhat.com",
"url": "https://gerrit.ovirt.org/gitweb?p=ovirt-engine.git%3Ba=commitdiff%3Bh=f4a5d0cc772127dbfe40789e26c4633ceea07d14%3Bhp=e6e8704ac9eb115624ff66e2965877d8e63a45f4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/101933"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHEA-2017:3138"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15113"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://gerrit.ovirt.org/gitweb?p=ovirt-engine.git%3Ba=commitdiff%3Bh=f4a5d0cc772127dbfe40789e26c4633ceea07d14%3Bhp=e6e8704ac9eb115624ff66e2965877d8e63a45f4"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-212"
}
],
"source": "secalert@redhat.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-532"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.