-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Critical: Multicluster Engine for Kubernetes 2.0.9 security fixes and container updates Advisory ID: RHSA-2023:3353-01 Product: multicluster engine for Kubernetes Advisory URL: https://access.redhat.com/errata/RHSA-2023:3353 Issue date: 2023-05-30 CVE Names: CVE-2022-2795 CVE-2022-2928 CVE-2022-2929 CVE-2022-36227 CVE-2022-41973 CVE-2023-27535 CVE-2023-32313 CVE-2023-32314 ===================================================================== 1. Summary: Multicluster Engine for Kubernetes 2.0.9 General Availability release images, which fix security issues and update container images. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section. 2. Description: Multicluster Engine for Kubernetes 2.0.9 images Multicluster engine for Kubernetes provides the foundational components that are necessary for the centralized management of multiple Kubernetes-based clusters across data centers, public clouds, and private clouds. You can use the engine to create new Red Hat OpenShift Container Platform clusters or to bring existing Kubernetes-based clusters under management by importing them. After the clusters are managed, you can use the APIs that are provided by the engine to distribute configuration based on placement policy. Security fix(es): * CVE-2023-32314 vm2: Sandbox Escape * CVE-2023-32313 vm2: Inspect Manipulation 3. Solution: For multicluster engine for Kubernetes, see the following documentation for details on how to install the images: https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html-single/multicluster_engine_operator/index#installing-while-connected-online 4. Bugs fixed (https://bugzilla.redhat.com/): 2208376 - CVE-2023-32314 vm2: Sandbox Escape 2208377 - CVE-2023-32313 vm2: Inspect Manipulation 5. References: https://access.redhat.com/security/cve/CVE-2022-2795 https://access.redhat.com/security/cve/CVE-2022-2928 https://access.redhat.com/security/cve/CVE-2022-2929 https://access.redhat.com/security/cve/CVE-2022-36227 https://access.redhat.com/security/cve/CVE-2022-41973 https://access.redhat.com/security/cve/CVE-2023-27535 https://access.redhat.com/security/cve/CVE-2023-32313 https://access.redhat.com/security/cve/CVE-2023-32314 https://access.redhat.com/security/updates/classification/#critical 6. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2023 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBZHsDKtzjgjWX9erEAQiCaxAAg13g7gG+8ypdz3ovJCkfLUF4Qtmtt0H+ 86n0MM3MWzy2difiDiCswyNSPL0hULASDVFKIkAwWEbmm1WYbPTadAe3x/TTmUhC U0EyWLnWGnxDmnnC5SgrIjHFLJrjKG4Qa/ZbtZxUMNLkA0d2KlOYgwBu5m4gRuyH 73QFUE+iyqV4emMUIhgqyjsWEeiE/GdAz8KM0Rav/+zG9n8JMP3Lmc3W9T6rgqX9 gwyeDqvF81ZRmAWoPrTrsoTNXe69es+5hv8hHEoU2noEfuFMStuOGqA2Mvddrztp rGtuLVMcoMTX+f9yxXReqHdTJEpBcmDZhl1TAg8aYb44isoxoRFSx+G73Akv00Uq mWjTOJ6D/9T+h8tBFUKxYHxjgl/3xt3t4SFqH+un4S+vlypAJO6+mPZjjKRoJE88 8w0za9kbUo/r+ST1J12JOs6JrqAR7qDWad1Mkrk0qmSZLSQ9H7plF1j3XA8ZlBs7 CAtgi3Cg85DByF4e26/WUw69z9Foh5qgr05c3G/AHELLcJY/DdJUOCeoNBo9HYi7 K/l2J78/t7kuQgVSxC+//gMGxGj1z5itHHvxJ12ZTUO3ts/jwHGa49Ow2hh7WdCE Wpa76bv+X+X0M3riX5X8x+Kw4iu3Hs8t8U6SaMkFGIQs5CTrDPcaEbjCa2CxJUe4 JvKwaYiKHlY= =wc9k -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce