First published: Wed Mar 10 2021(Updated: )
OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform.<br>This advisory contains the following OpenShift Virtualization 2.6.0 images:<br>RHEL-8-CNV-2.6<br>==============<br>kubevirt-cpu-node-labeller-container-v2.6.0-5<br>kubevirt-cpu-model-nfd-plugin-container-v2.6.0-5<br>node-maintenance-operator-container-v2.6.0-13<br>kubevirt-vmware-container-v2.6.0-5<br>virtio-win-container-v2.6.0-5<br>kubevirt-kvm-info-nfd-plugin-container-v2.6.0-5<br>bridge-marker-container-v2.6.0-9<br>kubevirt-template-validator-container-v2.6.0-9<br>kubevirt-v2v-conversion-container-v2.6.0-6<br>kubemacpool-container-v2.6.0-13<br>kubevirt-ssp-operator-container-v2.6.0-40<br>hyperconverged-cluster-webhook-container-v2.6.0-73<br>hyperconverged-cluster-operator-container-v2.6.0-73<br>ovs-cni-plugin-container-v2.6.0-10<br>cnv-containernetworking-plugins-container-v2.6.0-10<br>ovs-cni-marker-container-v2.6.0-10<br>cluster-network-addons-operator-container-v2.6.0-16<br>hostpath-provisioner-container-v2.6.0-11<br>hostpath-provisioner-operator-container-v2.6.0-14<br>vm-import-virtv2v-container-v2.6.0-21<br>kubernetes-nmstate-handler-container-v2.6.0-19<br>vm-import-controller-container-v2.6.0-21<br>vm-import-operator-container-v2.6.0-21<br>virt-api-container-v2.6.0-111<br>virt-controller-container-v2.6.0-111<br>virt-handler-container-v2.6.0-111<br>virt-operator-container-v2.6.0-111<br>virt-launcher-container-v2.6.0-111<br>cnv-must-gather-container-v2.6.0-54<br>virt-cdi-importer-container-v2.6.0-24<br>virt-cdi-cloner-container-v2.6.0-24<br>virt-cdi-controller-container-v2.6.0-24<br>virt-cdi-uploadserver-container-v2.6.0-24<br>virt-cdi-apiserver-container-v2.6.0-24<br>virt-cdi-uploadproxy-container-v2.6.0-24<br>virt-cdi-operator-container-v2.6.0-24<br>hco-bundle-registry-container-v2.6.0-582<br>Security Fix(es):<br><li> golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic (CVE-2020-9283)</li> <li> golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference (CVE-2020-29652)</li> <li> gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation (CVE-2021-3121)</li> <li> golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)</li> <li> golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)</li> <li> golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)</li> <li> jwt-go: access restriction bypass vulnerability (CVE-2020-26160)</li> <li> golang-github-gorilla-websocket: integer overflow leads to denial of service (CVE-2020-27813)</li> <li> golang: math/big: panic during recursive division of very large numbers (CVE-2020-28362)</li> <li> containernetworking-cni: Arbitrary path injection via type field in CNI configuration (CVE-2021-20206)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.