- Issued:
- 2024-10-31
- Updated:
- 2024-10-31
RHSA-2024:8337 - Moderate: Run Once Duration Override Operator for Red Hat OpenShift 1.1.2 for RHEL 9
Synopsis
Moderate: Run Once Duration Override Operator for Red Hat OpenShift 1.1.2 for RHEL 9
Type/Severity
Security Advisory Moderate
Topic
Run Once Duration Override Operator for Red Hat OpenShift 1.1.2 for RHEL 9.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The Run Once Duration Override Operator for Red Hat OpenShift is an optional operator that makes it possible to override activeDeadlineSecondsOverride field during pod admission.
Security Fix(es):
- Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion (CVE-2024-34155)
- Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion (CVE-2024-34158)
Solution
Before applying this update, make sure all previously released errata relevant to your system have been applied.
Affected Products
| Product | Version | Arch |
|---|---|---|
| Run Once Duration Override Operator | 1 | x86_64 |
Fixes
CVEs
- CVE-2023-52425
- CVE-2024-2398
- CVE-2024-6232
- CVE-2024-6345
- CVE-2024-6923
- CVE-2024-28757
- CVE-2024-34155
- CVE-2024-34158
- CVE-2024-37370
- CVE-2024-37371
- CVE-2024-37891
References
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.