vulnerability
SUSE: CVE-2024-0793: SUSE Linux Security Advisory
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:N/AC:L/Au:S/C:N/I:N/A:C) | 04/08/2024 | 04/09/2024 | 01/28/2025 |
Severity
7
CVSS
(AV:N/AC:L/Au:S/C:N/I:N/A:C)
Published
04/08/2024
Added
04/09/2024
Modified
01/28/2025
Description
A flaw was found in kube-controller-manager. This issue occurs when the initial application of a HPA config YAML lacking a .spec.behavior.scaleUp block causes a denial of service due to KCM pods going into restart churn.
Solution(s)
suse-upgrade-kubernetes1-23-apiserversuse-upgrade-kubernetes1-23-clientsuse-upgrade-kubernetes1-23-client-bash-completionsuse-upgrade-kubernetes1-23-client-commonsuse-upgrade-kubernetes1-23-client-fish-completionsuse-upgrade-kubernetes1-23-controller-managersuse-upgrade-kubernetes1-23-kubeadmsuse-upgrade-kubernetes1-23-kubeletsuse-upgrade-kubernetes1-23-kubelet-commonsuse-upgrade-kubernetes1-23-proxysuse-upgrade-kubernetes1-23-schedulersuse-upgrade-kubernetes1-24-apiserversuse-upgrade-kubernetes1-24-clientsuse-upgrade-kubernetes1-24-client-bash-completionsuse-upgrade-kubernetes1-24-client-commonsuse-upgrade-kubernetes1-24-client-fish-completionsuse-upgrade-kubernetes1-24-controller-managersuse-upgrade-kubernetes1-24-kubeadmsuse-upgrade-kubernetes1-24-kubeletsuse-upgrade-kubernetes1-24-kubelet-commonsuse-upgrade-kubernetes1-24-proxysuse-upgrade-kubernetes1-24-schedulersuse-upgrade-kubernetes1-25-clientsuse-upgrade-kubernetes1-25-client-commonsuse-upgrade-kubernetes1-26-clientsuse-upgrade-kubernetes1-26-client-common

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.