Security update for kubevirt, virt-api-container, virt-controller-container, virt-handler-container, virt-launcher-container, virt-libguestfs-tools-container, virt-operator-container (important)
Discription

An update that solves three vulnerabilities and has two
fixes is now available.

Description:

This update for kubevirt, virt-api-container, virt-controller-container,
virt-handler-container, virt-launcher-container,
virt-libguestfs-tools-container, virt-operator-container fixes the
following issues:

Security issues fixed:

– CVE-2022-1798: Fix arbitrary file read on the host from KubeVirt VMs
(bsc#1202516)

Security issues fixed in vendored dependencies:

– CVE-2022-1996: Fixed go-restful CORS bypass (bsc#1200528)
– CVE-2022-29162: Fixed runc incorrect handling of inheritable
capabilities in default configuration (bsc#1199460)

Other fixes:

– Pack nft rules and nsswitch.conf for virt-handler
– Only create 1MiB-aligned disk images (bsc#1199603)
– Avoid to return nil failure message
– Use semantic equality comparison
– Allow to configure utility containers for update test
– Install nftables to manage network rules
– Install tar to allow kubectl cp …
– Symlink nsswitch.conf and nft rules to proper locations
– Enable USB redirection support for QEMU
– Install vim-small instread of vim
– Drop libvirt-daemon-driver-storage-core
– Install ethtool and gawk (bsc#1199392)
– Use non-versioned appliance to avoid redundant rpm query
– Explicitly state the dependency on kubevirt main package

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– openSUSE Leap 15.3:

zypper in -t patch openSUSE-SLE-15.3-2022-3321=1

– SUSE Linux Enterprise Module for Containers 15-SP3:

zypper in -t patch SUSE-SLE-Module-Containers-15-SP3-2022-3321=1Read More

Back to Main

Subscribe for the latest news: