- Issued:
- 2024-10-16
- Updated:
- 2024-10-16
RHSA-2024:7548 - Security Advisory
Synopsis
Moderate: Run Once Duration Override Operator for Red Hat OpenShift 1.2.0 for RHEL 9
Type/Severity
Security Advisory: Moderate
Topic
Run Once Duration Override Operator for Red Hat OpenShift 1.2.0 for RHEL 9.
Red Hat Product Security has rated this update as having a security impact of
Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives
a detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.
Description
The Run Once Duration Override Operator for Red Hat OpenShift is an optional
operator that makes it possible to override activeDeadlineSecondsOverride
field during pod admission.
Security Fix(es):
- golang: net: malformed DNS message can cause infinite loop (CVE-2024-24788)
- golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses (CVE-2024-24790)
- net/http: Denial of service due to improper 100-continue handling in net/http (CVE-2024-24791)
- encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON (CVE-2024-24786)
- memory exhaustion in Request.ParseMultipartForm (CVE-2023-45290)
Solution
Before applying this update, make sure all previously released errata relevant to your system have been applied.
Affected Products
- Run Once Duration Override Operator 1 for RHEL 9 x86_64
Fixes
- BZ - 2268017 - CVE-2023-45290 golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm
- BZ - 2268046 - CVE-2024-24786 golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON
CVEs
x86_64
run-once-duration-override-operator/run-once-duration-override-operator-bundle@sha256:68178c1bdb8ea36faf602d639af290096b40d796aaf8f0e66bff1f6de1ec036a |
run-once-duration-override-operator/run-once-duration-override-rhel9@sha256:0432f8a46dbe6ef3abd0d164d935bf23ad860b290e885efc58cc75f5c0dfab62 |
run-once-duration-override-operator/run-once-duration-override-rhel9-operator@sha256:2921354dbe51a94c750e11621acbbaffa8068780a5c495c749fed0751189c89d |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.