- Issued:
- 2025-06-02
- Updated:
- 2025-06-02
RHSA-2025:8390 - Important: Multicluster Engine for Kubernetes 2.4.9 security updates and bug fixes
Synopsis
Important: Multicluster Engine for Kubernetes 2.4.9 security updates and bug fixes
Type/Severity
Security Advisory Important
Topic
Multicluster Engine for Kubernetes 2.4.9 General Availability release images, which fix bugs and update container images.
Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.
Description
Multicluster engine for Kubernetes v2.4.9 images
Multicluster engine for Kubernetes provides the foundational components that are necessary for the centralized management of multiple Kubernetes-based clusters across data centers, public clouds, and private clouds.
You can use the engine to create new Red Hat OpenShift Container Platform clusters or to bring existing Kubernetes-based clusters under management by importing them. After the clusters are managed, you can use the APIs that are provided by the engine to distribute configuration based on placement policy.
Security fixes
-
golang-jwt/jwt: jwt-go allows excessive memory allocation during header parsing (CVE-2025-30204)
-
golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2/jws (CVE-2025-22868)
Solution
For multicluster engine for Kubernetes, see the following documentation for details on how to install the images:
Affected Products
| Product | Version | Arch |
|---|---|---|
| multicluster engine for Kubernetes | Text-only Advisories | x86_64 |
Fixes
- This content is not included.BZ - 2348366
- This content is not included.BZ - 2354195
- This content is not included.ACM-10166
CVEs
- CVE-2024-8176
- CVE-2024-11187
- CVE-2024-12087
- CVE-2024-12088
- CVE-2024-12133
- CVE-2024-12243
- CVE-2024-12747
- CVE-2024-56171
- CVE-2025-0395
- CVE-2025-22868
- CVE-2025-24528
- CVE-2025-24928
- CVE-2025-30204
References
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.