Bug 1103976

Summary: rhevm-engine-setup: weak default passwords for PostgreSQL database users
Product: Red Hat Enterprise Virtualization Manager Reporter: David Jorm <djorm>
Component: ovirt-engine-setupAssignee: Sandro Bonazzola <sbonazzo>
Status: CLOSED ERRATA QA Contact: Pavel Stehlik <pstehlik>
Severity: medium Docs Contact:
Priority: medium    
Version: 3.3.0CC: alonbl, aneelica, bazulay, cpelland, dblechte, dfediuck, gklein, idith, iheim, juwu, mik, mjc, rbalakri, Rhev-m-bugs, sbonazzo, sherold, yeylon
Target Milestone: ---Keywords: Security, ZStream
Target Release: 3.5.0   
Hardware: All   
OS: Linux   
Whiteboard: integration
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Previously, setting up a PostgreSQL database with the engine-setup command generated weak passwords for PostgreSQL users. Since the PostgreSQL database is accessible remotely with a default Red Hat Enterprise Virtualization Manager installation, this was a security issue. With this update, stronger random passwords were generated and the password length has been extended to 22 characters.
Story Points: ---
Clone Of: 1097022
: 1111084 (view as bug list) Environment:
Last Closed: 2015-02-11 18:03:07 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1097022    
Bug Blocks: 1097023, 1111084, 1111277, 1142923, 1156165    

Comment 3 Sandro Bonazzola 2014-06-19 08:37:30 UTC
already in ovirt-3.5.0-alpha2

Comment 4 Petr Beňas 2014-06-19 08:50:07 UTC
[root@pb-rh34 ~]# grep PASS /etc/ovirt-engine/engine.conf.d/10-setup-database.conf | cut -d '=' -f 2 | wc -c
9
[root@pb-rh34 ~]# rpm -qa rhevm
rhevm-3.4.0-0.22.el6ev.noarch


[root@pb-rh35 ~]# grep PASS /etc/ovirt-engine/engine.conf.d/10-setup-database.conf | cut -d '=' -f 2 | wc -c
25
[root@pb-rh35 ~]# rpm -qa ovirt-engine
ovirt-engine-3.5.0-0.0.master.20140612090854.el6.noarch

Comment 8 errata-xmlrpc 2015-02-11 18:03:07 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://rhn.redhat.com/errata/RHSA-2015-0158.html