An update that solves three vulnerabilities and has two
fixes is now available.
Description:
This update for kubevirt, virt-api-container, virt-controller-container,
virt-handler-container, virt-launcher-container,
virt-libguestfs-tools-container, virt-operator-container fixes the
following issues:
Security issues fixed:
– CVE-2022-1798: Fix arbitrary file read on the host from KubeVirt VMs
(bsc#1202516)
Security issues fixed in vendored dependencies:
– CVE-2022-1996: Fixed go-restful CORS bypass (bsc#1200528)
– CVE-2022-29162: Fixed runc incorrect handling of inheritable
capabilities in default configuration (bsc#1199460)
Other fixes:
– Pack nft rules and nsswitch.conf for virt-handler
– Only create 1MiB-aligned disk images (bsc#1199603)
– Avoid to return nil failure message
– Use semantic equality comparison
– Allow to configure utility containers for update test
– Install nftables to manage network rules
– Install tar to allow kubectl cp …
– Symlink nsswitch.conf and nft rules to proper locations
– Enable USB redirection support for QEMU
– Install vim-small instread of vim
– Drop libvirt-daemon-driver-storage-core
– Install ethtool and gawk (bsc#1199392)
– Use non-versioned appliance to avoid redundant rpm query
– Explicitly state the dependency on kubevirt main package
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-3321=1
– SUSE Linux Enterprise Module for Containers 15-SP3:
zypper in -t patch SUSE-SLE-Module-Containers-15-SP3-2022-3321=1Read More