-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Critical: Multicluster Engine for Kubernetes 2.2.4 security fixes and container updates
Advisory ID:       RHSA-2023:3296-01
Product:           multicluster engine for Kubernetes
Advisory URL:      https://access.redhat.com/errata/RHSA-2023:3296
Issue date:        2023-05-24
CVE Names:         CVE-2022-2795 CVE-2022-2928 CVE-2022-2929 
                   CVE-2022-3172 CVE-2022-31690 CVE-2022-31692 
                   CVE-2022-36227 CVE-2022-41973 CVE-2022-42889 
                   CVE-2023-0361 CVE-2023-2491 CVE-2023-24422 
                   CVE-2023-25725 CVE-2023-27535 CVE-2023-27898 
                   CVE-2023-27899 CVE-2023-27903 CVE-2023-27904 
                   CVE-2023-32313 CVE-2023-32314 
====================================================================
1. Summary:

Multicluster Engine for Kubernetes 2.2.4 General Availability release
images,
which fix security issues and update container images.

Red Hat Product Security has rated this update as having a security impact
of Critical. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE links in the References section.

2. Description:

Multicluster Engine for Kubernetes 2.2.4 images

Multicluster engine for Kubernetes provides the foundational components
that are necessary for the centralized management of multiple
Kubernetes-based clusters across data centers, public clouds, and private
clouds.

You can use the engine to create new Red Hat OpenShift Container Platform
clusters or to bring existing Kubernetes-based clusters under management by
importing them. After the clusters are managed, you can use the APIs that
are provided by the engine to distribute configuration based on placement
policy.

Security fix(es):
* CVE-2023-32314 vm2: Sandbox Escape
* CVE-2023-32313 vm2: Inspect Manipulation

3. Solution:

For multicluster engine for Kubernetes, see the following documentation for
details on how to install the images:


4. Bugs fixed (https://bugzilla.redhat.com/):

2208376 - CVE-2023-32314 vm2: Sandbox Escape
2208377 - CVE-2023-32313 vm2: Inspect Manipulation

5. References:

https://access.redhat.com/security/cve/CVE-2022-2795
https://access.redhat.com/security/cve/CVE-2022-2928
https://access.redhat.com/security/cve/CVE-2022-2929
https://access.redhat.com/security/cve/CVE-2022-3172
https://access.redhat.com/security/cve/CVE-2022-31690
https://access.redhat.com/security/cve/CVE-2022-31692
https://access.redhat.com/security/cve/CVE-2022-36227
https://access.redhat.com/security/cve/CVE-2022-41973
https://access.redhat.com/security/cve/CVE-2022-42889
https://access.redhat.com/security/cve/CVE-2023-0361
https://access.redhat.com/security/cve/CVE-2023-2491
https://access.redhat.com/security/cve/CVE-2023-24422
https://access.redhat.com/security/cve/CVE-2023-25725
https://access.redhat.com/security/cve/CVE-2023-27535
https://access.redhat.com/security/cve/CVE-2023-27898
https://access.redhat.com/security/cve/CVE-2023-27899
https://access.redhat.com/security/cve/CVE-2023-27903
https://access.redhat.com/security/cve/CVE-2023-27904
https://access.redhat.com/security/cve/CVE-2023-32313
https://access.redhat.com/security/cve/CVE-2023-32314
https://access.redhat.com/security/updates/classification/#critical

6. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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ylZU
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2023-3296:01 Critical: Multicluster Engine for Kubernetes 2.2.4

Multicluster Engine for Kubernetes 2.2.4 General Availability release images, which fix security issues and update container images

Summary

Multicluster Engine for Kubernetes 2.2.4 images
Multicluster engine for Kubernetes provides the foundational components that are necessary for the centralized management of multiple Kubernetes-based clusters across data centers, public clouds, and private clouds.
You can use the engine to create new Red Hat OpenShift Container Platform clusters or to bring existing Kubernetes-based clusters under management by importing them. After the clusters are managed, you can use the APIs that are provided by the engine to distribute configuration based on placement policy.
Security fix(es): * CVE-2023-32314 vm2: Sandbox Escape * CVE-2023-32313 vm2: Inspect Manipulation



Summary


Solution

For multicluster engine for Kubernetes, see the following documentation for details on how to install the images:

References

https://access.redhat.com/security/cve/CVE-2022-2795 https://access.redhat.com/security/cve/CVE-2022-2928 https://access.redhat.com/security/cve/CVE-2022-2929 https://access.redhat.com/security/cve/CVE-2022-3172 https://access.redhat.com/security/cve/CVE-2022-31690 https://access.redhat.com/security/cve/CVE-2022-31692 https://access.redhat.com/security/cve/CVE-2022-36227 https://access.redhat.com/security/cve/CVE-2022-41973 https://access.redhat.com/security/cve/CVE-2022-42889 https://access.redhat.com/security/cve/CVE-2023-0361 https://access.redhat.com/security/cve/CVE-2023-2491 https://access.redhat.com/security/cve/CVE-2023-24422 https://access.redhat.com/security/cve/CVE-2023-25725 https://access.redhat.com/security/cve/CVE-2023-27535 https://access.redhat.com/security/cve/CVE-2023-27898 https://access.redhat.com/security/cve/CVE-2023-27899 https://access.redhat.com/security/cve/CVE-2023-27903 https://access.redhat.com/security/cve/CVE-2023-27904 https://access.redhat.com/security/cve/CVE-2023-32313 https://access.redhat.com/security/cve/CVE-2023-32314 https://access.redhat.com/security/updates/classification/#critical

Package List


Severity
Advisory ID: RHSA-2023:3296-01
Product: multicluster engine for Kubernetes
Advisory URL: https://access.redhat.com/errata/RHSA-2023:3296
Issued Date: : 2023-05-24
CVE Names: CVE-2022-2795 CVE-2022-2928 CVE-2022-2929 CVE-2022-3172 CVE-2022-31690 CVE-2022-31692 CVE-2022-36227 CVE-2022-41973 CVE-2022-42889 CVE-2023-0361 CVE-2023-2491 CVE-2023-24422 CVE-2023-25725 CVE-2023-27535 CVE-2023-27898 CVE-2023-27899 CVE-2023-27903 CVE-2023-27904 CVE-2023-32313 CVE-2023-32314

Topic

Multicluster Engine for Kubernetes 2.2.4 General Availability releaseimages,which fix security issues and update container images.Red Hat Product Security has rated this update as having a security impactof Critical. A Common Vulnerability Scoring System (CVSS) base score,which gives a detailed severity rating, is available for each vulnerabilityfrom the CVE links in the References section.


Topic


 

Relevant Releases Architectures


Bugs Fixed

2208376 - CVE-2023-32314 vm2: Sandbox Escape

2208377 - CVE-2023-32313 vm2: Inspect Manipulation


Related News