- Issued:
- 2024-09-17
- Updated:
- 2024-09-17
RHSA-2024:6738 - Moderate: Multicluster Engine for Kubernetes 2.5.7 security updates and bug fixes
Synopsis
Moderate: Multicluster Engine for Kubernetes 2.5.7 security updates and bug fixes
Type/Severity
Security Advisory Moderate
Topic
Multicluster Engine for Kubernetes 2.5.7 General Availability release images, which fix bugs and update container images.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.
Description
Multicluster engine for Kubernetes v2.5.7 images
Multicluster engine for Kubernetes provides the foundational components that are necessary for the centralized management of multiple Kubernetes-based clusters across data centers, public clouds, and private clouds.
You can use the engine to create new Red Hat OpenShift Container Platform clusters or to bring existing Kubernetes-based clusters under management by importing them. After the clusters are managed, you can use the APIs that are provided by the engine to distribute configuration based on placement policy.
Security fix(es):
CVE-2024-42459 nodejs/elliptic: EDDSA signature malleability occurs because there is a missing signature length check, and thus zero-valued bytes can be removed or appended CVE-2024-42460 nodejs/elliptic: ECDSA signature malleability occurs because there is a missing check for whether the leading bit of r and s is zero CVE-2024-42461 nodejs/elliptic: ECDSA implementation malleability due to BER-enconded signatures being allowed CVE-2024-6104 go-retryablehttp: url might write sensitive information to log file
Solution
For multicluster engine for Kubernetes, see the following documentation for details on how to install the images:
Affected Products
| Product | Version | Arch |
|---|---|---|
| multicluster engine for Kubernetes | 1 | x86_64 |
Fixes
CVEs
- CVE-2024-6104
- CVE-2024-6923
- CVE-2024-34397
- CVE-2024-37370
- CVE-2024-37371
- CVE-2024-37891
- CVE-2024-42459
- CVE-2024-42460
- CVE-2024-42461
- CVE-2024-48949
References
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.