-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: OpenShift Virtualization 4.9.2 Images security and bug fix update Advisory ID: RHSA-2022:0191-01 Product: cnv Advisory URL: https://access.redhat.com/errata/RHSA-2022:0191 Issue date: 2022-01-19 CVE Names: CVE-2021-31525 CVE-2021-33195 CVE-2021-33197 CVE-2021-33198 CVE-2021-34558 CVE-2021-42574 CVE-2021-43527 ==================================================================== 1. Summary: Red Hat OpenShift Virtualization release 4.9.2 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform. This advisory contains the following OpenShift Virtualization 4.9.2 images: RHEL-8-CNV-4.9 =============kubevirt-vmware-container-v4.9.2-1 virtio-win-container-v4.9.2-1 kubemacpool-container-v4.9.2-1 ovs-cni-plugin-container-v4.9.2-1 ovs-cni-marker-container-v4.9.2-1 node-maintenance-operator-container-v4.9.2-1 cnv-containernetworking-plugins-container-v4.9.2-1 hostpath-provisioner-container-v4.9.2-1 bridge-marker-container-v4.9.2-1 kubevirt-template-validator-container-v4.9.2-1 cluster-network-addons-operator-container-v4.9.2-1 kubernetes-nmstate-handler-container-v4.9.2-1 hostpath-provisioner-operator-container-v4.9.2-2 cnv-must-gather-container-v4.9.2-2 virt-cdi-controller-container-v4.9.2-8 virt-cdi-apiserver-container-v4.9.2-8 virt-cdi-uploadserver-container-v4.9.2-8 virt-cdi-operator-container-v4.9.2-8 virt-cdi-uploadproxy-container-v4.9.2-8 virt-cdi-cloner-container-v4.9.2-8 virt-cdi-importer-container-v4.9.2-8 hyperconverged-cluster-webhook-container-v4.9.2-6 hyperconverged-cluster-operator-container-v4.9.2-6 kubevirt-ssp-operator-container-v4.9.2-3 kubevirt-v2v-conversion-container-v4.9.2-2 vm-import-controller-container-v4.9.2-2 vm-import-operator-container-v4.9.2-2 vm-import-virtv2v-container-v4.9.2-2 virt-launcher-container-v4.9.2-7 virt-controller-container-v4.9.2-7 virt-api-container-v4.9.2-7 virt-operator-container-v4.9.2-7 virt-artifacts-server-container-v4.9.2-7 libguestfs-tools-container-v4.9.2-7 virt-handler-container-v4.9.2-7 hco-bundle-registry-container-v4.9.2-27 Security Fix(es): * golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header (CVE-2021-31525) * golang: net: lookup functions may return invalid host names (CVE-2021-33195) * golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197) * golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198) * golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 3. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 4. Bugs fixed (https://bugzilla.redhat.com/): 1954505 - [RFE] Better to have an output message when virtctl addvolume/removevolume to a VM 1958341 - CVE-2021-31525 golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header 1983596 - CVE-2021-34558 golang: crypto/tls: certificate of wrong type is causing TLS client to panic 1989564 - CVE-2021-33195 golang: net: lookup functions may return invalid host names 1989570 - CVE-2021-33197 golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty 1989575 - CVE-2021-33198 golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents 1992961 - Regular user cannot create VM because of an unclear error 1995824 - CDI permission error fills up logs 2015279 - Hotplugging a second a second block device cause the first one to disappear. 2018468 - In an upgraded cluster hco.spec.featureGates.sriovLiveMigration value is not updated to true 2022895 - Post upgrade (4.9.0 -> 4.9.1) hostpath provisioner pods are not restarted 2026198 - Post upgrade (4.9.1->4.10.0), hco status version did not change 2028154 - VM restore fails for VM with runstrategy 2030198 - [CNV-4.9.1] must-gather failing to execute /usr/bin/logs.sh script 2032853 - 4.9.2 containers 5. References: https://access.redhat.com/security/cve/CVE-2021-31525 https://access.redhat.com/security/cve/CVE-2021-33195 https://access.redhat.com/security/cve/CVE-2021-33197 https://access.redhat.com/security/cve/CVE-2021-33198 https://access.redhat.com/security/cve/CVE-2021-34558 https://access.redhat.com/security/cve/CVE-2021-42574 https://access.redhat.com/security/cve/CVE-2021-43527 https://access.redhat.com/security/updates/classification/#moderate 6. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYeiqMtzjgjWX9erEAQjMRhAAgoV6kbo5GwD/V51M2V/5aBXs98AzmXVe OvsE05/BAglbRltVYY22iJWI1ouXCE1gf2dqPB3XWUAHvsdpte6Ue5MG5WWB8ZWA hVWy0oT3h7fJ308IGp4Ke+b6+pkx07ne4/IsBRWwepiuu4E0ldrgVB5jxPm4XGRz bxslWQ9AzEVtyKZVLFbA3MofXlfEPkdx0TBgXhmwIY9piVT856MpecL6UWm/+H3g 3WDrUo0fr3SQixIrIE+1+famhjZj2NmZs9yOzJcC4S8o0cWn7B5EhVYobWMQmxJG mF0pDbrU6MuP4vk/kLzILGGDpbJG81WgV4Avwg+tmkZ+nyUtQpfBpmGECLiMuTUh rt0graL//3ItvlAyHu42PRaDEyygd6n1dncAR8DNQSd3yh5kDMU0PbW5zIpym5zX 9qDblko4/ChBGvT6AFpIWSBF0WEIcZUEB05wpbE7cuVe/E9le668M0Y2bGzIGAvF gdWZND9WJ4L/A+YFgIF5gtKh2F7MmPNC7yKWQZquEvBfwA9UR+pfFCTe61i7uAEC gf/J5guJ+c5dDA0t2mepFBp2bdIdz5n2emCFB+kpbmQfk+RFEnFzFa/JWqotXeUy UT5O9c4W/lDgjjJXVT1Bb6KqQzgF531Bg5rNp/fY1LnThezqqyLrFiARk3VUEIMt LK9c5VNRAVs=W5xD -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce