- Issued:
- 2024-07-01
- Updated:
- 2024-07-01
RHSA-2024:3637 - Security Advisory
Synopsis
Moderate: Secondary Scheduler Operator for Red Hat OpenShift 1.3.0 for RHEL 9
Type/Severity
Security Advisory: Moderate
Topic
Secondary Scheduler Operator for Red Hat OpenShift 1.3.0 for RHEL 9
Red Hat Product Security has rated this update as having a security impact of
Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a
detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.
Description
The Secondary Scheduler Operator for Red Hat OpenShift is an optional
operator that makes it possible to deploy a secondary scheduler by
providing a scheduler image. You can run a scheduler with custom
plugins without applying additional manifests, such as cluster roles
and deployments.
Security Fix(es):
- golang: net/http: memory exhaustion in Request.ParseMultipartForm (CVE-2023-45290)
- golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm (CVE-2024-24783)
- golang: net/mail: comments in display names are incorrectly handled (CVE-2024-24784)
- golang: html/template: errors returned from MarshalJSON methods may break template escaping (CVE-2024-24785)
- golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS (CVE-2023-45288)
- golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON (CVE-2024-24786)
Solution
Before applying this update, make sure all previously released errata relevant to your system have been applied.
Affected Products
- Secondary Scheduler Operator for Red Hat OpenShift (OSSO) 1 for RHEL 9 x86_64
Fixes
- BZ - 2268017 - CVE-2023-45290 golang: net/http: memory exhaustion in Request.ParseMultipartForm
- BZ - 2268019 - CVE-2024-24783 golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm
- BZ - 2268021 - CVE-2024-24784 golang: net/mail: comments in display names are incorrectly handled
- BZ - 2268022 - CVE-2024-24785 golang: html/template: errors returned from MarshalJSON methods may break template escaping
- BZ - 2268046 - CVE-2024-24786 golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON
- BZ - 2268273 - CVE-2023-45288 golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS
- WRKLDS-1037 - 11- [OSSO 1.3.0] GA Release
- OCPBUGS-28656 - warnings are seen in the secondary scheduler operator logs
x86_64
openshift-secondary-scheduler-operator/secondary-scheduler-operator-bundle@sha256:928093dd060cc7b4fe5704aa4330265cbabc93151fc7f8c2104506e3e83260db |
openshift-secondary-scheduler-operator/secondary-scheduler-rhel9-operator@sha256:652de240961fe6a63a9e64b6d4e1701559bc106453b1c4905455f0a48ee4dd82 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.