Important: OpenShift Virtualization 4.9.6 Images security and bug fix update

Related Vulnerabilities: CVE-2022-0494   CVE-2022-1271   CVE-2022-1353   CVE-2022-1798   CVE-2022-2526   CVE-2022-29154  

Synopsis

Important: OpenShift Virtualization 4.9.6 Images security and bug fix update

Type/Severity

Security Advisory: Important

Topic

Red Hat OpenShift Virtualization release 4.9.6 is now available with updates to packages and images that fix several bugs and add enhancements.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

This advisory contains the following OpenShift Virtualization 4.9.6 images:

RHEL-8-CNV-4.9
==============
cnv-must-gather-container-v4.9.6-7
kubevirt-template-validator-container-v4.9.6-6
kubevirt-ssp-operator-container-v4.9.6-5
virt-cdi-uploadserver-container-v4.9.6-4
virt-cdi-cloner-container-v4.9.6-4
virt-cdi-importer-container-v4.9.6-4
virt-cdi-uploadproxy-container-v4.9.6-4
virt-cdi-apiserver-container-v4.9.6-4
virt-cdi-controller-container-v4.9.6-4
virt-cdi-operator-container-v4.9.6-4
hostpath-provisioner-container-v4.9.6-3
hyperconverged-cluster-webhook-container-v4.9.6-3
hyperconverged-cluster-operator-container-v4.9.6-3
node-maintenance-operator-container-v4.9.6-4
kubevirt-vmware-container-v4.9.6-3
kubevirt-v2v-conversion-container-v4.9.6-3
ovs-cni-plugin-container-v4.9.6-3
cnv-containernetworking-plugins-container-v4.9.6-3
bridge-marker-container-v4.9.6-4
ovs-cni-marker-container-v4.9.6-3
kubemacpool-container-v4.9.6-4
kubernetes-nmstate-handler-container-v4.9.6-5
cluster-network-addons-operator-container-v4.9.6-5
virt-controller-container-v4.9.6-9
virt-handler-container-v4.9.6-9
virt-api-container-v4.9.6-9
virt-operator-container-v4.9.6-9
virt-artifacts-server-container-v4.9.6-9
virt-launcher-container-v4.9.6-9
libguestfs-tools-container-v4.9.6-9
virtio-win-container-v4.9.6-3
hostpath-provisioner-operator-container-v4.9.6-3
vm-import-operator-container-v4.9.6-3
vm-import-controller-container-v4.9.6-3
vm-import-virtv2v-container-v4.9.6-3
hco-bundle-registry-container-v4.9.6-51

Security Fix(es):

  • kubeVirt: Arbitrary file read on the host from KubeVirt VMs (CVE-2022-1798)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Container Native Virtualization 4.9 for RHEL 8 x86_64
  • Red Hat Container Native Virtualization 4.9 for RHEL 7 x86_64

Fixes

  • BZ - 2092269 - We cant migrate to newer target node and than return to the source node when using host-model cpu
  • BZ - 2097313 - RHEL9 templates missing UEFI params
  • BZ - 2101174 - [4.9.z]VM restore PVC uses exact source PVC request size
  • BZ - 2110783 - 4.8 to 4.9 upgrade path blocked due to bug in NMState pods
  • BZ - 2117872 - CVE-2022-1798 kubeVirt: Arbitrary file read on the host from KubeVirt VMs
  • BZ - 2118317 - KubeVirtComponentExceedsRequestedMemory Prometheus Rule is Failing to Evaluate