- Issued:
- 2024-12-02
- Updated:
- 2024-12-02
RHSA-2024:8704 - Moderate: Kube Descheduler Operator for Red Hat OpenShift 5.0.2 for RHEL 9
Synopsis
Moderate: Kube Descheduler Operator for Red Hat OpenShift 5.0.2 for RHEL 9
Type/Severity
Security Advisory Moderate
Topic
Kube Descheduler Operator for Red Hat OpenShift 5.0.2 for RHEL 9
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The Kube Descheduler Operator for Red Hat OpenShift is an optional operator that deploys the descheduler, which is responsible for evicting pods based on certain strategies.
Security Fix(es):
- Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion (CVE-2024-34155)
- Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion (CVE-2024-34158)
- encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON (CVE-2024-24786)
Solution
Before applying this update, make sure all previously released errata relevant to your system have been applied.
Affected Products
| Product | Version | Arch |
|---|---|---|
| Kube Descheduler Operator | 5 | x86_64 |
Fixes
- This content is not included.BZ - 2268046
- This content is not included.BZ - 2310527
- This content is not included.BZ - 2310529
CVEs
- CVE-2023-52425
- CVE-2024-2398
- CVE-2024-3596
- CVE-2024-6232
- CVE-2024-6345
- CVE-2024-6923
- CVE-2024-24786
- CVE-2024-28757
- CVE-2024-34155
- CVE-2024-34158
- CVE-2024-37891
References
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.