Red Hat 9042 Published by

Red Hat has released OpenShift Virtualization 2.4.2 images.



RHSA-2020:4201-01: Low: OpenShift Virtualization 2.4.2 Images



=====================================================================
Red Hat Security Advisory

Synopsis: Low: OpenShift Virtualization 2.4.2 Images
Advisory ID: RHSA-2020:4201-01
Product: Container-native Virtualization
Advisory URL:   https://access.redhat.com/errata/RHSA-2020:4201
Issue date: 2020-10-06
CVE Names: CVE-2019-11756 CVE-2019-17006 CVE-2019-17023
CVE-2020-12402 CVE-2020-12825 CVE-2020-14352
CVE-2020-14365 CVE-2020-15586 CVE-2020-16845
=====================================================================

1. Summary:

Red Hat OpenShift Virtualization release 2.4.2 is now available with
updates to packages and images that fix several bugs and add enhancements.

Red Hat Product Security has rated this update as having a security impact
of Low. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

OpenShift Virtualization is Red Hat's virtualization solution designed for
Red Hat OpenShift Container Platform.

Security Fix(es):

* golang: data race in certain net/http servers including ReverseProxy can
lead to DoS (CVE-2020-15586)

* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes
from invalid inputs (CVE-2020-16845)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Bug Fix(es):

* Container-native Virtualization 2.4.2 Images (BZ#1877407)

This advisory contains the following OpenShift Virtualization 2.4.2 images:

RHEL-7-CNV-2.4
==============
kubevirt-ssp-operator-container-v2.4.2-2

RHEL-8-CNV-2.4
==============
virt-cdi-controller-container-v2.4.2-1
virt-cdi-apiserver-container-v2.4.2-1
hostpath-provisioner-operator-container-v2.4.2-1
virt-cdi-uploadproxy-container-v2.4.2-1
virt-cdi-cloner-container-v2.4.2-1
virt-cdi-importer-container-v2.4.2-1
kubevirt-template-validator-container-v2.4.2-1
hostpath-provisioner-container-v2.4.2-1
virt-cdi-uploadserver-container-v2.4.2-1
virt-cdi-operator-container-v2.4.2-1
virt-controller-container-v2.4.2-1
kubevirt-cpu-model-nfd-plugin-container-v2.4.2-1
virt-api-container-v2.4.2-1
ovs-cni-marker-container-v2.4.2-1
kubevirt-cpu-node-labeller-container-v2.4.2-1
bridge-marker-container-v2.4.2-1
kubevirt-metrics-collector-container-v2.4.2-1
kubemacpool-container-v2.4.2-1
cluster-network-addons-operator-container-v2.4.2-1
ovs-cni-plugin-container-v2.4.2-1
kubernetes-nmstate-handler-container-v2.4.2-1
cnv-containernetworking-plugins-container-v2.4.2-1
virtio-win-container-v2.4.2-1
virt-handler-container-v2.4.2-1
virt-launcher-container-v2.4.2-1
cnv-must-gather-container-v2.4.2-1
virt-operator-container-v2.4.2-1
vm-import-controller-container-v2.4.2-1
hyperconverged-cluster-operator-container-v2.4.2-1
vm-import-operator-container-v2.4.2-1
kubevirt-vmware-container-v2.4.2-1
kubevirt-v2v-conversion-container-v2.4.2-1
kubevirt-kvm-info-nfd-plugin-container-v2.4.2-1
node-maintenance-operator-container-v2.4.2-1
hco-bundle-registry-container-v2.4.2-15

3. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

  https://access.redhat.com/articles/11258

4. Bugs fixed (  https://bugzilla.redhat.com/):

1856953 - CVE-2020-15586 golang: data race in certain net/http servers including ReverseProxy can lead to DoS
1867099 - CVE-2020-16845 golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs
1869194 - HCO CR display name should contain "OpenShift Virtualization" instead of CNV
1869734 - OpenShift Virtualization does not appear in OperatorHub when filtering to "Disconnected"
1875383 - terminationGracePeriodSeconds should be updated in VMs created from common templates
1877407 - Container-native Virtualization 2.4.2 Images

5. References:

  https://access.redhat.com/security/cve/CVE-2019-11756
  https://access.redhat.com/security/cve/CVE-2019-17006
  https://access.redhat.com/security/cve/CVE-2019-17023
  https://access.redhat.com/security/cve/CVE-2020-12402
  https://access.redhat.com/security/cve/CVE-2020-12825
  https://access.redhat.com/security/cve/CVE-2020-14352
  https://access.redhat.com/security/cve/CVE-2020-14365
  https://access.redhat.com/security/cve/CVE-2020-15586
  https://access.redhat.com/security/cve/CVE-2020-16845
  https://access.redhat.com/security/updates/classification/#low

6. Contact:

The Red Hat security contact is . More contact
details at   https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.