Lucene search

K
suseSuseSUSE-SU-2022:3333-1
HistorySep 22, 2022 - 12:00 a.m.

Security update for kubevirt, virt-api-container, virt-controller-container, virt-handler-container, virt-launcher-container, virt-libguestfs-tools-container, virt-operator-container (important)

2022-09-2200:00:00
lists.opensuse.org
25

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

6.4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

An update that solves three vulnerabilities and has two
fixes is now available.

Description:

This update for kubevirt, virt-api-container, virt-controller-container,
virt-handler-container, virt-launcher-container,
virt-libguestfs-tools-container, virt-operator-container fixes the
following issues:

The kubevirt stack was updated to version 0.54.0

Release notes https://github.com/kubevirt/kubevirt/releases/tag/v0.54.0

Security fixes:

  • CVE-2022-1798: Fix arbitrary file read on the host from KubeVirt VMs
    (bsc#1202516)

Security fixes in vendored dependencies:

  • CVE-2022-1996: Fixed go-restful CORS bypass bsc#1200528)

  • CVE-2022-29162: Fixed runc incorrect handling of inheritable
    capabilities in default configuration (bsc#1199460)

  • Fix containerdisk unmount logic

  • Support topology spread constraints

  • Update libvirt-go to fix memory leak

  • Pack nft rules and nsswitch.conf for virt-handler

  • Only create 1MiB-aligned disk images (bsc#1199603)

  • Avoid to return nil failure message

  • Use semantic equality comparison

  • Drop kubevirt-psp-caasp.yaml

  • Allow to configure utility containers for update test

  • Symlink nsswitch.conf and nft rules to proper locations

  • Drop unused package libvirt-client

  • Install vim-small instead of vim

  • Remove unneeded libvirt-daemon-driver-storage-core

  • Install missing packages ethtool and gawk. Fixes bsc#1199392

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

  • openSUSE Leap 15.4:

    zypper in -t patch openSUSE-SLE-15.4-2022-3333=1

  • SUSE Linux Enterprise Module for Containers 15-SP4:

    zypper in -t patch SUSE-SLE-Module-Containers-15-SP4-2022-3333=1

OSVersionArchitecturePackageVersionFilename
openSUSE Leap15.4x86_64< - openSUSE Leap 15.4 (x86_64):- openSUSE Leap 15.4 (x86_64):.x86_64.rpm
SUSE Linux Enterprise Module for Containers 15SP4x86_64<  SUSE Linux Enterprise Module for Containers 15-SP4 (x86_64):- SUSE Linux Enterprise Module for Containers 15-SP4 (x86_64):.x86_64.rpm

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

6.4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N