{"affected":[{"ecosystem_specific":{"binaries":[{"kubernetes1.24-client":"1.24.17-150400.9.16.1","kubernetes1.24-client-common":"1.24.17-150400.9.16.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP4-ESPOS","name":"kubernetes1.24","purl":"pkg:rpm/suse/kubernetes1.24&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-ESPOS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.24.17-150400.9.16.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kubernetes1.24-client":"1.24.17-150400.9.16.1","kubernetes1.24-client-common":"1.24.17-150400.9.16.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP4-LTSS","name":"kubernetes1.24","purl":"pkg:rpm/suse/kubernetes1.24&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.24.17-150400.9.16.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kubernetes1.24-client":"1.24.17-150400.9.16.1","kubernetes1.24-client-common":"1.24.17-150400.9.16.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15 SP4-LTSS","name":"kubernetes1.24","purl":"pkg:rpm/suse/kubernetes1.24&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP4-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.24.17-150400.9.16.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kubernetes1.24-client":"1.24.17-150400.9.16.1","kubernetes1.24-client-common":"1.24.17-150400.9.16.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 15 SP4","name":"kubernetes1.24","purl":"pkg:rpm/suse/kubernetes1.24&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.24.17-150400.9.16.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for kubernetes1.23 fixes the following issues:\n\n- CVE-2021-25743: escape, meta and control sequences in raw data output to terminal not neutralized. (bsc#1194400)\n- CVE-2023-2727: bypass of policies imposed by the ImagePolicyWebhook admission plugin. (bsc#1211630)\n- CVE-2023-2728: bypass of the mountable secrets policy enforced by the ServiceAccount admission plugin. (bsc#1211631)\n- CVE-2023-39325: go1.20: excessive resource consumption when dealing with rapid stream resets. (bsc#1229869)  \n- CVE-2023-44487: google.golang.org/grpc, kube-apiserver: HTTP/2 rapid reset vulnerability. (bsc#1229869)\n- CVE-2023-45288: golang.org/x/net: excessive CPU consumption when processing unlimited sets of headers. (bsc#1229869)\n- CVE-2024-0793: kube-controller-manager pod crash when processing malformed HPA v1 manifests. (bsc#1219964)  \n- CVE-2024-3177: bypass of the mountable secrets policy enforced by the ServiceAccount admission plugin. (bsc#1222539)\n- CVE-2024-24786: github.com/golang/protobuf: infinite loop when unmarshaling invalid JSON. (bsc#1229867)\n\nBug fixes:\n\n- Use -trimpath in non-DBG mode for reproducible builds. (bsc#1062303)\n- Fix multiple issues for successful `kubeadm init` run. (bsc#1214406)\n- Update go to version 1.22.5 in build requirements. (bsc#1229858)\n","id":"SUSE-SU-2024:3341-1","modified":"2024-09-19T14:50:41Z","published":"2024-09-19T14:50:41Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20243341-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1062303"},{"type":"REPORT","url":"https://bugzilla.suse.com/1194400"},{"type":"REPORT","url":"https://bugzilla.suse.com/1211630"},{"type":"REPORT","url":"https://bugzilla.suse.com/1211631"},{"type":"REPORT","url":"https://bugzilla.suse.com/1214406"},{"type":"REPORT","url":"https://bugzilla.suse.com/1216109"},{"type":"REPORT","url":"https://bugzilla.suse.com/1216123"},{"type":"REPORT","url":"https://bugzilla.suse.com/1219964"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221400"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222539"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226136"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229858"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229867"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229869"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230323"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-25743"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-2727"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-2728"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-39325"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-44487"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-45288"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-0793"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-24786"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-3177"}],"related":["CVE-2021-25743","CVE-2023-2727","CVE-2023-2728","CVE-2023-39325","CVE-2023-44487","CVE-2023-45288","CVE-2024-0793","CVE-2024-24786","CVE-2024-3177"],"summary":"Security update for kubernetes1.23","upstream":["CVE-2021-25743","CVE-2023-2727","CVE-2023-2728","CVE-2023-39325","CVE-2023-44487","CVE-2023-45288","CVE-2024-0793","CVE-2024-24786","CVE-2024-3177"]}