what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Red Hat Security Advisory 2022-4668-01

Red Hat Security Advisory 2022-4668-01
Posted May 19, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-4668-01 - Red Hat OpenShift Virtualization release 4.10.1 is now available with updates to packages and images that fix several bugs and add enhancements. Issues addressed include a denial of service vulnerability.

tags | advisory, denial of service
systems | linux, redhat
advisories | CVE-2021-36221, CVE-2021-41190, CVE-2022-0778, CVE-2022-21698, CVE-2022-24407, CVE-2022-25235, CVE-2022-25236, CVE-2022-25315
SHA-256 | 57ea642d5a0a1510cce8ff99f716b47bf753e4780e02ad6c833852fa3e9a589b

Red Hat Security Advisory 2022-4668-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Moderate: OpenShift Virtualization 4.10.1 Images security and bug fix update
Advisory ID: RHSA-2022:4668-01
Product: cnv
Advisory URL: https://access.redhat.com/errata/RHSA-2022:4668
Issue date: 2022-05-18
CVE Names: CVE-2021-36221 CVE-2021-41190 CVE-2022-0778
CVE-2022-21698 CVE-2022-24407 CVE-2022-25235
CVE-2022-25236 CVE-2022-25315
====================================================================
1. Summary:

Red Hat OpenShift Virtualization release 4.10.1 is now available with
updates to packages and images that fix several bugs and add enhancements.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

OpenShift Virtualization is Red Hat's virtualization solution designed for
Red Hat OpenShift Container Platform.

This advisory contains the following OpenShift Virtualization 4.10.1
images:

RHEL-8-CNV-4.10
=============
virtio-win-container-v4.10.1-4
hostpath-provisioner-operator-container-v4.10.1-6
bridge-marker-container-v4.10.1-12
cnv-containernetworking-plugins-container-v4.10.1-12
ovs-cni-plugin-container-v4.10.1-12
kubemacpool-container-v4.10.1-12
ovs-cni-marker-container-v4.10.1-12
kubernetes-nmstate-handler-container-v4.10.1-12
cluster-network-addons-operator-container-v4.10.1-12
cnv-must-gather-container-v4.10.1-15
hyperconverged-cluster-webhook-container-v4.10.1-19
hyperconverged-cluster-operator-container-v4.10.1-19
kubevirt-ssp-operator-container-v4.10.1-10
virt-cdi-apiserver-container-v4.10.1-16
virt-cdi-controller-container-v4.10.1-16
hostpath-provisioner-container-v4.10.1-5
virt-cdi-uploadserver-container-v4.10.1-16
node-maintenance-operator-container-v4.10.1-4
virt-cdi-operator-container-v4.10.1-16
virt-cdi-uploadproxy-container-v4.10.1-16
hostpath-csi-driver-container-v4.10.1-5
virt-cdi-cloner-container-v4.10.1-16
kubevirt-template-validator-container-v4.10.1-4
virt-cdi-importer-container-v4.10.1-16
virt-api-container-v4.10.1-8
virt-handler-container-v4.10.1-8
virt-controller-container-v4.10.1-8
virt-launcher-container-v4.10.1-8
virt-artifacts-server-container-v4.10.1-8
libguestfs-tools-container-v4.10.1-8
virt-operator-container-v4.10.1-8
hco-bundle-registry-container-v4.10.1-99

Security Fix(es):

* golang: net/http/httputil: panic due to racy read of persistConn after
handler panic (CVE-2021-36221)

* prometheus/client_golang: Denial of service using
InstrumentHandlerCounter (CVE-2022-21698)

* opencontainers: OCI manifest and index parsing confusion (CVE-2021-41190)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

3. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

4. Bugs fixed (https://bugzilla.redhat.com/):

1995656 - CVE-2021-36221 golang: net/http/httputil: panic due to racy read of persistConn after handler panic
2000478 - Using deprecated 1.25 API calls
2022742 - NNCP creation fails when node of a cluster is unavailable
2024938 - CVE-2021-41190 opencontainers: OCI manifest and index parsing confusion
2028619 - policy/v1beta1 PodDisruptionBudget is deprecated in v1.21+, unavailable in v1.25+
2029359 - NodeNetworkConfigurationPolicy refreshes all the conditions even if the policy has not gone to that state
2032837 - Add/remove label to priority class are not reconciled properly left HCO in Unknown status.
2033385 - Bug in kubernetes labels that are attached to the CNV logs
2038814 - [CNV-4.10-rhel9] hyperconverged-cluster-cli-download pod CrashLoopBackOff state
2039019 - Fix Top consumers dashboard
2045880 - CVE-2022-21698 prometheus/client_golang: Denial of service using InstrumentHandlerCounter
2046686 - Importer pod keeps in retarting when dataimportcron has a reference to invalid image sha
2049990 - must-gather: must-gather is logging errors about upstream only namespaces
2053390 - No DataImportCron for CentOS 7
2054778 - PVC created with filesystem volume mode in some cases, instead of block volume mode
2054782 - DataImportCron status does not show failure when failing to create dataSource
2055304 - [4.10.z] nmstate interprets interface names as float64 and subsequently crashes on state update
2055950 - cnv installation should set empty node selector for openshift-cnv namespace
2056421 - non-privileged user cannot add disk as it cannot update resource "virtualmachines/addvolume"
2056464 - nmstate-webhook pods getting scheduled on the same node
2056619 - [4.10.z] kubemacpool-mac-controller-manager not ready
2057142 - CDI aggregate roles missing some types
2057148 - Cross namespace smart clone may get stuck in NamespaceTransferInProgress phase
2057613 - nmpolicy capture - race condition when appying teardown nncp; nnce fails
2059185 - must-gather: Must-gather gather_vms_details is not working when used with a list of vms
2059613 - Must-gather: for vms with longer name, gather_vms_details fails to collect qemu, dump xml logs
2062227 - sriovLiveMigration should not be enabled on sno clusters
2062321 - when update attempt of hco.spec with storage classes failed, csv git stuck in installing state
2063991 - On upgraded cluster, "v2v-vmware" is present under hco.status.relatedObject
2065308 - CNV disables LiveMigration FG, but leaves LiveMigration workloadUpdateStrategy enabled
2065743 - 4.10.1 containers
2065755 - 4.10.1 rpms
2066086 - DataImportCrons do not automatically recover from unconfigured default storage class
2066712 - [4.10.z] Migration of vm from VMware reports pvc not large enough
2069055 - [4.10.z] On an upgraded cluster NetworkAddonsConfig seems to be reconciling in a loop
2070050 - [4.10.1] Custom guest PCI address and boot order parameters are not respected in a list of multiple SR-IOV NICs
2073880 - Cannot create VM on SNO cluster as live migration feature is not enabled
2077920 - Migration in sequence can be reported as failed even when it succeeded
2078878 - SSP: Common templates fix to pick right templates

5. References:

https://access.redhat.com/security/cve/CVE-2021-36221
https://access.redhat.com/security/cve/CVE-2021-41190
https://access.redhat.com/security/cve/CVE-2022-0778
https://access.redhat.com/security/cve/CVE-2022-21698
https://access.redhat.com/security/cve/CVE-2022-24407
https://access.redhat.com/security/cve/CVE-2022-25235
https://access.redhat.com/security/cve/CVE-2022-25236
https://access.redhat.com/security/cve/CVE-2022-25315
https://access.redhat.com/security/updates/classification/#moderate

6. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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lG+M
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close