An update that solves three vulnerabilities and has two
fixes is now available.
Description:
This update for kubevirt, virt-api-container, virt-controller-container,
virt-handler-container, virt-launcher-container,
virt-libguestfs-tools-container, virt-operator-container fixes the
following issues:
The kubevirt stack was updated to version 0.54.0
Release notes https://github.com/kubevirt/kubevirt/releases/tag/v0.54.0
Security fixes:
– CVE-2022-1798: Fix arbitrary file read on the host from KubeVirt VMs
(bsc#1202516)
Security fixes in vendored dependencies:
– CVE-2022-1996: Fixed go-restful CORS bypass bsc#1200528)
– CVE-2022-29162: Fixed runc incorrect handling of inheritable
capabilities in default configuration (bsc#1199460)
– Fix containerdisk unmount logic
– Support topology spread constraints
– Update libvirt-go to fix memory leak
– Pack nft rules and nsswitch.conf for virt-handler
– Only create 1MiB-aligned disk images (bsc#1199603)
– Avoid to return nil failure message
– Use semantic equality comparison
– Drop kubevirt-psp-caasp.yaml
– Allow to configure utility containers for update test
– Symlink nsswitch.conf and nft rules to proper locations
– Drop unused package libvirt-client
– Install vim-small instead of vim
– Remove unneeded libvirt-daemon-driver-storage-core
– Install missing packages ethtool and gawk. Fixes bsc#1199392
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-3333=1
– SUSE Linux Enterprise Module for Containers 15-SP4:
zypper in -t patch SUSE-SLE-Module-Containers-15-SP4-2022-3333=1Read More