- Issued:
- 2024-03-06
- Updated:
- 2024-03-06
RHSA-2024:0281 - Security Advisory
Synopsis
Moderate: Secondary Scheduler Operator for Red Hat OpenShift 1.2.1 for RHEL 9
Type/Severity
Security Advisory: Moderate
Topic
Secondary Scheduler Operator for Red Hat OpenShift 1.2.1 for RHEL 9
An update for secondary-scheduler-operator-bundle-container and secondary-scheduler-operator-container is now available for OSSO-1.2.1-RHEL-9.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The Secondary Scheduler Operator for Red Hat OpenShift is an optional
operator that makes it possible to deploy a secondary scheduler by
providing a scheduler image. You can run a scheduler with custom
plugins without applying additional manifests, such as cluster roles
and deployments.
Security Fix(es):
- golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests (CVE-2023-39326)
- golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges. (CVE-2023-45287)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Secondary Scheduler Operator for Red Hat OpenShift (OSSO) 1 for RHEL 9 x86_64
Fixes
- BZ - 2253193 - CVE-2023-45287 golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges.
- BZ - 2253330 - CVE-2023-39326 golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests
- WRKLDS-899 - New OSSO 1.2.1 release
- OCPBUGS-23328 - Unable to change resource limit and request for Secondary Scheduler pods which is created through Secondary Scheduler operator
- OCPBUGS-25130 - [RFE] successful with warnings are shown when fips scan testing is done for OSSO
- OCPBUGS-28584 - warnings are seen in the secondary scheduler operator logs
x86_64
openshift-secondary-scheduler-operator/secondary-scheduler-operator-bundle@sha256:959d5567fa57212bb1d707c6cd0b67d47af4431d7b567f81bcb7e19892fdde30 |
openshift-secondary-scheduler-operator/secondary-scheduler-rhel9-operator@sha256:b085cface9e8b74c3a2588ac70ccb1ea75740065aa006d2993c7f7295154c9dc |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.