- Issued:
- 2024-11-18
- Updated:
- 2024-11-18
RHSA-2024:8219 - Moderate: Secondary Scheduler Operator for Red Hat OpenShift 1.2.2 for RHEL 9
Synopsis
Moderate: Secondary Scheduler Operator for Red Hat OpenShift 1.2.2 for RHEL 9
Type/Severity
Security Advisory Moderate
Topic
Secondary Scheduler Operator for Red Hat OpenShift 1.2.2 for RHEL 9
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The Secondary Scheduler Operator for Red Hat OpenShift is an optional operator that makes it possible to deploy a secondary scheduler by providing a scheduler image. You can run a scheduler with custom plugins without applying additional manifests, such as cluster roles and deployments.
Security Fix(es):
- Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion (CVE-2024-34155)
- Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion (CVE-2024-34158)
- net/http: Denial of service due to improper 100-continue handling in net/http (CVE-2024-24791)
Solution
Before applying this update, make sure all previously released errata relevant to your system have been applied.
Affected Products
| Product | Version | Arch |
|---|---|---|
| Secondary Scheduler Operator for Red Hat OpenShift (OSSO) | 1 | x86_64 |
Fixes
- This content is not included.BZ - 2295310
- This content is not included.BZ - 2310527
- This content is not included.BZ - 2310529
CVEs
References
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.