Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1553529 - (CVE-2018-1074) CVE-2018-1074 ovirt-engine: API exposes power management credentials to administrators
CVE-2018-1074 ovirt-engine: API exposes power management credentials to admin...
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20180426,reported=2...
: Security
Depends On: 1558800
Blocks: 1553207
  Show dependency treegraph
 
Reported: 2018-03-08 21:03 EST by Doran Moppert
Modified: 2018-07-18 11:50 EDT (History)
16 users (show)

See Also:
Fixed In Version: ovirt-engine 4.2.2.5, ovirt-engine 4.1.11.2
Doc Type: If docs needed, set a value
Doc Text:
The ovirt-engine API and administration web portal exposed Power Management credentials including cleartext passwords to Host Administrators. A Host Administrator could use this flaw to gain access to the power management systems of hosts they control.
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Doran Moppert 2018-03-08 21:03:01 EST
The ovirt-engine API and administration web portal exposed Power Management credentials including cleartext passwords to Host Administrators.
Comment 2 Sandro Bonazzola 2018-04-20 11:02:16 EDT
Doran, which version is affected by this bug? Has this issue been already fixed?
This bug has no useful information for addressing the issue.
Is the issue handled in bug #1553207 ? I have no access to it.
Comment 4 Doran Moppert 2018-04-26 00:36:52 EDT
This issue was addressed in Red Hat Virtualization Manager (ovirt-engine) 4.1.11 via:

https://access.redhat.com/errata/RHBA-2018:1219

Note You need to log in before you can comment on or make changes to this bug.