First published: Mon Oct 30 2023(Updated: )
The multicluster engine for Kubernetes operator 2.1.9 images<br>The multicluster engine for Kubernetes operator provides the foundational components that are necessary for the centralized management of multiple<br>Kubernetes-based clusters across data centers, public clouds, and private<br>clouds.<br>You can use the engine to create new Red Hat OpenShift Container Platform<br>clusters or to bring existing Kubernetes-based clusters under management by<br>importing them. After the clusters are managed, you can use the APIs that<br>are provided by the engine to distribute configuration based on placement<br>policy.<br>Security fix(es):<br>CVE-2023-44487 HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack<br>CVE-2023-39325 golang: net/http, x/net/http2: rapid stream resets can cause excessive work<br>CVE-2023-39321 golang: crypto/tls: panic when processing post-handshake message on QUIC connections<br>CVE-2023-39319 golang: html/template: improper handling of special tags within script contexts<br>CVE-2023-39318 golang: html/template: improper handling of HTML-like comments within script contexts<br>CVE-2023-39322 golang: crypto/tls: lack of a limit on buffered post-handshake
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Multicluster Engine |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2023:6200 is categorized as important.
RHSA-2023:6200 addresses multiple security vulnerabilities in the Red Hat Multicluster Engine for Kubernetes.
To fix RHSA-2023:6200, you need to update the Red Hat Multicluster Engine for Kubernetes to the latest version provided in the advisory.
RHSA-2023:6200 affects users of the Red Hat Multicluster Engine for Kubernetes operator version 2.1.9.
Yes, vulnerabilities addressed in RHSA-2023:6200 could potentially lead to data breaches if not resolved.