[RHSA-2023:5421-01] Moderate: Multicluster Engine for Kubernetes 2.3.2 security updates and bug fixes

Security announcements for all Red Hat products and services. rhsa-announce at redhat.com
Tue Oct 3 21:27:28 UTC 2023


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: Multicluster Engine for Kubernetes 2.3.2 security updates and bug fixes
Advisory ID:       RHSA-2023:5421-01
Product:           multicluster engine for Kubernetes
Advisory URL:      https://access.redhat.com/errata/RHSA-2023:5421
Issue date:        2023-10-03
CVE Names:         CVE-2022-41721 CVE-2023-3899 CVE-2023-24539 
                   CVE-2023-24540 CVE-2023-26136 CVE-2023-29400 
                   CVE-2023-29491 CVE-2023-30630 CVE-2023-34969 
=====================================================================

1. Summary:

Multicluster Engine for Kubernetes 2.3.2 General Availability release
images,
which contain security updates and fix bugs.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE links in the References section.

2. Description:

Multicluster Engine for Kubernetes 2.3.2 images

Multicluster engine for Kubernetes provides the foundational components
that are necessary for the centralized management of multiple
Kubernetes-based clusters across data centers, public clouds, and private
clouds.

You can use the engine to create new Red Hat OpenShift Container Platform
clusters or to bring existing Kubernetes-based clusters under management by
importing them. After the clusters are managed, you can use the APIs that
are provided by the engine to distribute configuration based on placement
policy.

Security fix(es):
* CVE-2023-26136 tough-cookie: prototype pollution in cookie memstore
* CVE-2022-41721 x/net/http2/h2c: request smuggling
* CVE-2023-24539 golang: html/template: improper sanitization of CSS values
* CVE-2023-24540 golang: html/template: improper handling of JavaScript
whitespace
* CVE-2023-29400 golang: html/template: improper handling of empty HTML
attributes

3. Solution:

For multicluster engine for Kubernetes, see the following documentation for
details on how to install the images:

https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.8/html/clusters/cluster_mce_overview#installing-while-connected-online-mce

4. Bugs fixed (https://bugzilla.redhat.com/):

2162182 - CVE-2022-41721 x/net/http2/h2c: request smuggling
2196026 - CVE-2023-24539 golang: html/template: improper sanitization of CSS values
2196027 - CVE-2023-24540 golang: html/template: improper handling of JavaScript whitespace
2196029 - CVE-2023-29400 golang: html/template: improper handling of empty HTML attributes
2219310 - CVE-2023-26136 tough-cookie: prototype pollution in cookie memstore

5. References:

https://access.redhat.com/security/cve/CVE-2022-41721
https://access.redhat.com/security/cve/CVE-2023-3899
https://access.redhat.com/security/cve/CVE-2023-24539
https://access.redhat.com/security/cve/CVE-2023-24540
https://access.redhat.com/security/cve/CVE-2023-26136
https://access.redhat.com/security/cve/CVE-2023-29400
https://access.redhat.com/security/cve/CVE-2023-29491
https://access.redhat.com/security/cve/CVE-2023-30630
https://access.redhat.com/security/cve/CVE-2023-34969
https://access.redhat.com/security/updates/classification/#moderate

6. Contact:

The Red Hat security contact is <secalert at redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=IwZP
-----END PGP SIGNATURE-----


More information about the RHSA-announce mailing list