Red Hat 8826 Published by

A Multicluster Engine for Kubernetes 2.2.4 security fixes and container updates has been released.



RHSA-2023:3296-01: Critical: Multicluster Engine for Kubernetes 2.2.4 security fixes and container updates



=====================================================================
Red Hat Security Advisory

Synopsis: Critical: Multicluster Engine for Kubernetes 2.2.4 security fixes and container updates
Advisory ID: RHSA-2023:3296-01
Product: multicluster engine for Kubernetes
Advisory URL:   https://access.redhat.com/errata/RHSA-2023:3296
Issue date: 2023-05-24
CVE Names: CVE-2022-2795 CVE-2022-2928 CVE-2022-2929
CVE-2022-3172 CVE-2022-31690 CVE-2022-31692
CVE-2022-36227 CVE-2022-41973 CVE-2022-42889
CVE-2023-0361 CVE-2023-2491 CVE-2023-24422
CVE-2023-25725 CVE-2023-27535 CVE-2023-27898
CVE-2023-27899 CVE-2023-27903 CVE-2023-27904
CVE-2023-32313 CVE-2023-32314
=====================================================================

1. Summary:

Multicluster Engine for Kubernetes 2.2.4 General Availability release
images,
which fix security issues and update container images.

Red Hat Product Security has rated this update as having a security impact
of Critical. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE links in the References section.

2. Description:

Multicluster Engine for Kubernetes 2.2.4 images

Multicluster engine for Kubernetes provides the foundational components
that are necessary for the centralized management of multiple
Kubernetes-based clusters across data centers, public clouds, and private
clouds.

You can use the engine to create new Red Hat OpenShift Container Platform
clusters or to bring existing Kubernetes-based clusters under management by
importing them. After the clusters are managed, you can use the APIs that
are provided by the engine to distribute configuration based on placement
policy.

Security fix(es):
* CVE-2023-32314 vm2: Sandbox Escape
* CVE-2023-32313 vm2: Inspect Manipulation

3. Solution:

For multicluster engine for Kubernetes, see the following documentation for
details on how to install the images:

  https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.7/html/clusters/install_upgrade/installing-while-connected-online-mce

4. Bugs fixed (  https://bugzilla.redhat.com/):

2208376 - CVE-2023-32314 vm2: Sandbox Escape
2208377 - CVE-2023-32313 vm2: Inspect Manipulation

5. References:

  https://access.redhat.com/security/cve/CVE-2022-2795
  https://access.redhat.com/security/cve/CVE-2022-2928
  https://access.redhat.com/security/cve/CVE-2022-2929
  https://access.redhat.com/security/cve/CVE-2022-3172
  https://access.redhat.com/security/cve/CVE-2022-31690
  https://access.redhat.com/security/cve/CVE-2022-31692
  https://access.redhat.com/security/cve/CVE-2022-36227
  https://access.redhat.com/security/cve/CVE-2022-41973
  https://access.redhat.com/security/cve/CVE-2022-42889
  https://access.redhat.com/security/cve/CVE-2023-0361
  https://access.redhat.com/security/cve/CVE-2023-2491
  https://access.redhat.com/security/cve/CVE-2023-24422
  https://access.redhat.com/security/cve/CVE-2023-25725
  https://access.redhat.com/security/cve/CVE-2023-27535
  https://access.redhat.com/security/cve/CVE-2023-27898
  https://access.redhat.com/security/cve/CVE-2023-27899
  https://access.redhat.com/security/cve/CVE-2023-27903
  https://access.redhat.com/security/cve/CVE-2023-27904
  https://access.redhat.com/security/cve/CVE-2023-32313
  https://access.redhat.com/security/cve/CVE-2023-32314
  https://access.redhat.com/security/updates/classification/#critical

6. Contact:

The Red Hat security contact is . More contact
details at   https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.