-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: Multicluster Engine for Kubernetes 2.0.8 security updates and bug fixes Advisory ID: RHSA-2023:2098-01 Product: multicluster engine for Kubernetes Advisory URL: https://access.redhat.com/errata/RHSA-2023:2098 Issue date: 2023-05-03 CVE Names: CVE-2022-4304 CVE-2022-4450 CVE-2022-25881 CVE-2023-0215 CVE-2023-0286 CVE-2023-0361 CVE-2023-0767 CVE-2023-23916 ===================================================================== 1. Summary: Multicluster Engine for Kubernetes 2.0.8 General Availability release images, which fix bugs and security updates container images. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section. 2. Description: Multicluster Engine for Kubernetes 2.0.8 images Multicluster engine for Kubernetes provides the foundational components that are necessary for the centralized management of multiple Kubernetes-based clusters across data centers, public clouds, and private clouds. You can use the engine to create new Red Hat OpenShift Container Platform clusters or to bring existing Kubernetes-based clusters under management by importing them. After the clusters are managed, you can use the APIs that are provided by the engine to distribute configuration based on placement policy. Security fix(es): * CVE-2022-25881 http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability 3. Solution: For multicluster engine for Kubernetes, see the following documentation for details on how to install the images: https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html/multicluster_engine/installing-while-connected-online 4. Bugs fixed (https://bugzilla.redhat.com/): 2165824 - CVE-2022-25881 http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability 5. References: https://access.redhat.com/security/cve/CVE-2022-4304 https://access.redhat.com/security/cve/CVE-2022-4450 https://access.redhat.com/security/cve/CVE-2022-25881 https://access.redhat.com/security/cve/CVE-2023-0215 https://access.redhat.com/security/cve/CVE-2023-0286 https://access.redhat.com/security/cve/CVE-2023-0361 https://access.redhat.com/security/cve/CVE-2023-0767 https://access.redhat.com/security/cve/CVE-2023-23916 https://access.redhat.com/security/updates/classification/#moderate 6. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2023 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBZFKfntzjgjWX9erEAQjzTRAAgbw6nyT8DYKVrPuDiHXl8jDs+/ti1oVT MWeeFOnyO89RIrJbGDgN6kcvNl91RZpGJey995jr/IsmVAgsKMPc2w7kkggl1/B8 eo8ZnA16W5Cv/mfyupOb8puL6U75epTQT4oAdS1cxfke+LRs/PZZvoxYcLRnTR21 Si9XVhh8/cGUCOFSQRRSa57CNLWxpm3da4zNyK9fSYjHQQOi759a1aeRiXTIL32c xXuzMwwjCusqh0moVnNH/zdyuBRWPfvIW9EzamsyVB+AZ7b/16bCq+z9KCXfYV9q r2Vf2ZAVaQ0pd4mS4zvXi2Mq4JQtHRMmVSN2b49K6ZjhlAL9PSATGtlQZnMx6tDt K58LrzMi0+J8JkCu5kn4CUmY4OZGUaggpZ7GPAR0+WxyG7Pk/yL87O7EhVSSEfA5 0L9LsgcJfSBIGHz1ij+Vs+ChuK8lMw62bPMRmH5udtHXe+4JUgJCJ5LemDIhxtw/ 0qQY7uChfK92SNfgqzZRGl1uY4nOLp9oonxK7LdU084sdWLBjQ2FZEaKLRLDulX7 ZJYP84XglXd7MNrSwTbxzQ7yObLkvufltR49+f02w3H3YDgMwYIxkVdyj+Om2ytF GLpRp8MxmJt2QsARFvGvl0NOU0vfS+bX1VUKQ/Tr3y09zySCbBHmswKAx2UGa4Xh LmjloF5IKn0= =wZvw -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce