- 发布:
- 2024-05-23
- 已更新:
- 2024-05-23
RHSA-2024:2901 - Security Advisory
概述
Low: Custom Metrics Autoscaler Operator for Red Hat OpenShift 2.12.1-394 Security Update
类型/严重性
Security Advisory: Low
标题
Custom Metrics Autoscaler Operator for Red Hat OpenShift including security
updates.
The following updates for the Custom Metric Autoscaler operator for Red Hat
OpenShift are now available:
- custom-metrics-autoscaler-adapter-container
- custom-metrics-autoscaler-admission-webhooks-container
- custom-metrics-autoscaler-container
- custom-metrics-autoscaler-operator-bundle-container
- custom-metrics-autoscaler-operator-container
Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
描述
The Custom Metrics Autoscaler Operator for Red Hat OpenShift is an optional
operator, based on the Kubernetes Event Driven Autoscaler (KEDA), which allows
workloads to be scaled using additional metrics sources other than pod metrics.
This release builds upon updated compiler, runtime library, and base images for
the purpose of resolving any potential security issues present in previous
toolset versions.
This version makes use of newer tools and libraries to address the following
issues:
golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON (CVE-2024-24786)
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS (CVE-2023-45288)
golang: html/template: errors returned from MarshalJSON methods may break template escaping (CVE-2024-24785)
golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm (CVE-2024-24783)
golang: net/http: memory exhaustion in Request.ParseMultipartForm (CVE-2023-45290)
golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect (CVE-2023-45289)
This release is based upon KEDA 2.12.1
解决方案
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
受影响的产品
- Custom Metric Autoscaler 2 x86_64
修复
(none)CVE
x86_64
| custom-metrics-autoscaler/custom-metrics-autoscaler-adapter-rhel8@sha256:1b0955076b99b7b240ef4baf55c079a8bba0d779fff6828e9acae70f4c71ad2b |
| custom-metrics-autoscaler/custom-metrics-autoscaler-admission-webhooks-rhel8@sha256:cd17032a683ebcdee0a8566e9427cc4e20eaa7413489dc2f9739bb1338c4c4a1 |
| custom-metrics-autoscaler/custom-metrics-autoscaler-operator-bundle@sha256:b37be6f77b561de87de3a1678ac59edf6fc56fac6eabb86d767013ba5beca423 |
| custom-metrics-autoscaler/custom-metrics-autoscaler-rhel8@sha256:0a3f76360bc53346024baad729ee588e5bf8f616bfcdc31ebbe7772060ecd380 |
| custom-metrics-autoscaler/custom-metrics-autoscaler-rhel8-operator@sha256:de412b59e51684011b87900b31c46b04ef7b3f82b17ec65c9606b5d493aa8a69 |
Red Hat 安全团队联络方式为 secalert@redhat.com。 更多联络细节请参考 https://access.redhat.com/security/team/contact/。