-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Critical: Multicluster Engine for Kubernetes 2.0.2 security and bug fixes Advisory ID: RHSA-2022:6422-01 Product: multicluster engine for Kubernetes Advisory URL: https://access.redhat.com/errata/RHSA-2022:6422 Issue date: 2022-09-12 CVE Names: CVE-2022-1292 CVE-2022-1586 CVE-2022-2068 CVE-2022-2097 CVE-2022-2526 CVE-2022-29154 CVE-2022-31129 CVE-2022-32206 CVE-2022-32208 CVE-2022-36067 ===================================================================== 1. Summary: Multicluster Engine for Kubernetes 2.0.2 General Availability release images, which fix bugs and update container images. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: Multicluster Engine for Kubernetes 2.0.2 images Multicluster engine for Kubernetes provides the foundational components that are necessary for the centralized management of multiple Kubernetes-based clusters across data centers, public clouds, and private clouds. You can use the engine to create new Red Hat OpenShift Container Platform clusters or to bring existing Kubernetes-based clusters under management by importing them. After the clusters are managed, you can use the APIs that are provided by the engine to distribute configuration based on placement policy. Security updates: * moment: inefficient parsing algorithm resulting in DoS (CVE-2022-31129) * vm2: Sandbox Escape in vm2 (CVE-2022-36067) Bug fix: * MCE 2.0.2 images (BZ# 2104569) 3. Solution: For multicluster engine for Kubernetes, see the following documentation for details on how to install the images: https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html-single/multicluster_engine/index#installing-while-connected-online 4. Bugs fixed (https://bugzilla.redhat.com/): 2104569 - MCE 2.0.2 Images 2105075 - CVE-2022-31129 moment: inefficient parsing algorithm resulting in DoS 2124794 - CVE-2022-36067 vm2: Sandbox Escape in vm2 5. References: https://access.redhat.com/security/cve/CVE-2022-1292 https://access.redhat.com/security/cve/CVE-2022-1586 https://access.redhat.com/security/cve/CVE-2022-2068 https://access.redhat.com/security/cve/CVE-2022-2097 https://access.redhat.com/security/cve/CVE-2022-2526 https://access.redhat.com/security/cve/CVE-2022-29154 https://access.redhat.com/security/cve/CVE-2022-31129 https://access.redhat.com/security/cve/CVE-2022-32206 https://access.redhat.com/security/cve/CVE-2022-32208 https://access.redhat.com/security/cve/CVE-2022-36067 https://access.redhat.com/security/updates/classification/#critical 6. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYx/ZE9zjgjWX9erEAQhbpRAAnrVFxA3ysaEyVvjATrV/+s/mSS15vc9c BMOsF9Qhg9Xs6cTMtHCc/6UMIdt5Y3XrDZqiJXro8PiEauZN7ewuPVHqDMFTSh4b HqkGWlfcO82D9XJmuHfOkYjN6/JVZumnZBwoRLWrb3rLcH9ts16eyY7ZZoOl5WPl Y1iZxaAiaH1KZ0V87JULdgvdAZRAmdhJ7j7OfT48vMK3qB/biE6w25FFY/3taH4G AmqoWeQEpb1kzstycot3zC+rz+fw5ZyNvHKmqr0tHEZlrrYaYJ9KT38X051E3S86 mzQsFDghNHfBVnGJkkI3a41R938Q0PaFDDCANvnwdFhHHjlPSDeF9ItNtuN6M7GZ Ag/mvx+S5FoaQicSQ2cG8NPfiqlal1DW7CfZzU0SZVW4eymHCO8x7CAG4Nx2glRg 29icYCdXr4hRCGVUzZ1Oc5Bc7B0YedYYRPIUuRgFoftTilslX98t0vk/iVnS1gh4 IYIFqX7G3PDuA0LGkFwGWiHScG694KaHpOXEjVihItBtBtde/SCyKOT9JX+3oBol JNF/keAS8eKSSxN6+flGIEqY0KbC830ULrDxlDvS3+nMRlAWXhX855SGx+XzE+0C cowhIi9th3Fc6cj7+BDIPk9xwLSDsedWAGnGV+ODiiTtbZksLdY35X1f9q1hdZG4 InSpkcWJhKc= =eQtF -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce