First published: Wed Nov 17 2021(Updated: )
OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform.<br>This advisory contains the following OpenShift Virtualization 2.6.8 images:<br>RHEL-8-CNV-2.6<br>==============<br>kubevirt-v2v-conversion-container-v2.6.8-1<br>hyperconverged-cluster-webhook-container-v2.6.8-1<br>vm-import-controller-container-v2.6.8-1<br>kubevirt-cpu-model-nfd-plugin-container-v2.6.8-2<br>vm-import-operator-container-v2.6.8-1<br>kubevirt-cpu-node-labeller-container-v2.6.8-1<br>kubevirt-ssp-operator-container-v2.6.8-1<br>kubemacpool-container-v2.6.8-1<br>cluster-network-addons-operator-container-v2.6.8-1<br>virt-cdi-cloner-container-v2.6.8-1<br>virt-cdi-uploadproxy-container-v2.6.8-1<br>kubernetes-nmstate-handler-container-v2.6.8-1<br>ovs-cni-plugin-container-v2.6.8-1<br>ovs-cni-marker-container-v2.6.8-1<br>hostpath-provisioner-operator-container-v2.6.8-1<br>kubevirt-vmware-container-v2.6.8-2<br>kubevirt-template-validator-container-v2.6.8-2<br>kubevirt-kvm-info-nfd-plugin-container-v2.6.8-1<br>node-maintenance-operator-container-v2.6.8-1<br>vm-import-virtv2v-container-v2.6.8-1<br>hostpath-provisioner-container-v2.6.8-1<br>virt-cdi-uploadserver-container-v2.6.8-1<br>cnv-containernetworking-plugins-container-v2.6.8-1<br>virtio-win-container-v2.6.8-2<br>virt-cdi-controller-container-v2.6.8-1<br>virt-cdi-importer-container-v2.6.8-1<br>virt-cdi-apiserver-container-v2.6.8-1<br>virt-cdi-operator-container-v2.6.8-1<br>bridge-marker-container-v2.6.8-1<br>hyperconverged-cluster-operator-container-v2.6.8-1<br>cnv-must-gather-container-v2.6.8-5<br>virt-launcher-container-v2.6.8-5<br>virt-operator-container-v2.6.8-5<br>virt-api-container-v2.6.8-5<br>virt-controller-container-v2.6.8-5<br>virt-handler-container-v2.6.8-5<br>hco-bundle-registry-container-v2.6.8-23<br>Security Fix(es):<br><li> golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)</li> <li> golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.