Lucene search

K
suseSuseSUSE-SU-2022:3321-1
HistorySep 20, 2022 - 12:00 a.m.

Security update for kubevirt, virt-api-container, virt-controller-container, virt-handler-container, virt-launcher-container, virt-libguestfs-tools-container, virt-operator-container (important)

2022-09-2000:00:00
lists.opensuse.org
76

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

6.4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

An update that solves three vulnerabilities and has two
fixes is now available.

Description:

This update for kubevirt, virt-api-container, virt-controller-container,
virt-handler-container, virt-launcher-container,
virt-libguestfs-tools-container, virt-operator-container fixes the
following issues:

Security issues fixed:

  • CVE-2022-1798: Fix arbitrary file read on the host from KubeVirt VMs
    (bsc#1202516)

Security issues fixed in vendored dependencies:

  • CVE-2022-1996: Fixed go-restful CORS bypass (bsc#1200528)
  • CVE-2022-29162: Fixed runc incorrect handling of inheritable
    capabilities in default configuration (bsc#1199460)

Other fixes:

  • Pack nft rules and nsswitch.conf for virt-handler
  • Only create 1MiB-aligned disk images (bsc#1199603)
  • Avoid to return nil failure message
  • Use semantic equality comparison
  • Allow to configure utility containers for update test
  • Install nftables to manage network rules
  • Install tar to allow kubectl cp …
  • Symlink nsswitch.conf and nft rules to proper locations
  • Enable USB redirection support for QEMU
  • Install vim-small instread of vim
  • Drop libvirt-daemon-driver-storage-core
  • Install ethtool and gawk (bsc#1199392)
  • Use non-versioned appliance to avoid redundant rpm query
  • Explicitly state the dependency on kubevirt main package

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

  • openSUSE Leap 15.3:

    zypper in -t patch openSUSE-SLE-15.3-2022-3321=1

  • SUSE Linux Enterprise Module for Containers 15-SP3:

    zypper in -t patch SUSE-SLE-Module-Containers-15-SP3-2022-3321=1

OSVersionArchitecturePackageVersionFilename
openSUSE Leap15.3x86_64< - openSUSE Leap 15.3 (x86_64):- openSUSE Leap 15.3 (x86_64):.x86_64.rpm
SUSE Linux Enterprise Module for Containers 15SP3x86_64<  SUSE Linux Enterprise Module for Containers 15-SP3 (x86_64):- SUSE Linux Enterprise Module for Containers 15-SP3 (x86_64):.x86_64.rpm

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

6.4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N