<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for kubernetes1.24</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2024:3343-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-09-19T14:51:26Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-09-19T14:51:26Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-09-19T14:51:26Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for kubernetes1.24</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for kubernetes1.24 fixes the following issues:

- CVE-2021-25743: escape, meta and control sequences in raw data output to terminal not neutralized. (bsc#1194400)
- CVE-2023-2727: bypass of policies imposed by the ImagePolicyWebhook admission plugin. (bsc#1211630)
- CVE-2023-2728: bypass of the mountable secrets policy enforced by the ServiceAccount admission plugin. (bsc#1211631)
- CVE-2023-39325: go1.20: excessive resource consumption when dealing with rapid stream resets. (bsc#1229869)  
- CVE-2023-44487: google.golang.org/grpc, kube-apiserver: HTTP/2 rapid reset vulnerability. (bsc#1229869)
- CVE-2023-45288: golang.org/x/net: excessive CPU consumption when processing unlimited sets of headers. (bsc#1229869)
- CVE-2024-0793: kube-controller-manager pod crash when processing malformed HPA v1 manifests. (bsc#1219964)  
- CVE-2024-3177: bypass of the mountable secrets policy enforced by the ServiceAccount admission plugin. (bsc#1222539)
- CVE-2024-24786: github.com/golang/protobuf: infinite loop when unmarshaling invalid JSON. (bsc#1229867)

Bug fixes:

- Use -trimpath in non-DBG mode for reproducible builds. (bsc#1062303)
- Fix multiple issues for successful `kubeadm init` run. (bsc#1214406)
- Update go to version 1.22.5 in build requirements. (bsc#1229858)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2024-3343,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3343,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3343,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3343,SUSE-Storage-7.1-2024-3343</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20243343-1/</URL>
      <Description>Link for SUSE-SU-2024:3343-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-updates/2024-September/036980.html</URL>
      <Description>E-Mail link for SUSE-SU-2024:3343-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1062303</URL>
      <Description>SUSE Bug 1062303</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1194400</URL>
      <Description>SUSE Bug 1194400</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1211630</URL>
      <Description>SUSE Bug 1211630</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1211631</URL>
      <Description>SUSE Bug 1211631</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1214406</URL>
      <Description>SUSE Bug 1214406</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1216109</URL>
      <Description>SUSE Bug 1216109</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1216123</URL>
      <Description>SUSE Bug 1216123</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1219964</URL>
      <Description>SUSE Bug 1219964</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1221400</URL>
      <Description>SUSE Bug 1221400</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222539</URL>
      <Description>SUSE Bug 1222539</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1226136</URL>
      <Description>SUSE Bug 1226136</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1229858</URL>
      <Description>SUSE Bug 1229858</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1229867</URL>
      <Description>SUSE Bug 1229867</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1229869</URL>
      <Description>SUSE Bug 1229869</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1230323</URL>
      <Description>SUSE Bug 1230323</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-25743/</URL>
      <Description>SUSE CVE CVE-2021-25743 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-2727/</URL>
      <Description>SUSE CVE CVE-2023-2727 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-2728/</URL>
      <Description>SUSE CVE CVE-2023-2728 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-39325/</URL>
      <Description>SUSE CVE CVE-2023-39325 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-44487/</URL>
      <Description>SUSE CVE CVE-2023-44487 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-45288/</URL>
      <Description>SUSE CVE CVE-2023-45288 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-0793/</URL>
      <Description>SUSE CVE CVE-2024-0793 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-24786/</URL>
      <Description>SUSE CVE CVE-2024-24786 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-3177/</URL>
      <Description>SUSE CVE CVE-2024-3177 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Enterprise Storage 7.1">
      <Branch Type="Product Name" Name="SUSE Enterprise Storage 7.1">
        <FullProductName ProductID="SUSE Enterprise Storage 7.1" CPE="cpe:/o:suse:ses:7.1">SUSE Enterprise Storage 7.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" CPE="cpe:/o:suse:sle_hpc-ltss:15:sp3">SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 15 SP3-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 15 SP3-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP3-LTSS" CPE="cpe:/o:suse:sles-ltss:15:sp3">SUSE Linux Enterprise Server 15 SP3-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 15 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 15 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP3" CPE="cpe:/o:suse:sles_sap:15:sp3">SUSE Linux Enterprise Server for SAP Applications 15 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="kubernetes1.24-apiserver-1.24.17-150300.7.6.1">
      <FullProductName ProductID="kubernetes1.24-apiserver-1.24.17-150300.7.6.1">kubernetes1.24-apiserver-1.24.17-150300.7.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kubernetes1.24-client-1.24.17-150300.7.6.1">
      <FullProductName ProductID="kubernetes1.24-client-1.24.17-150300.7.6.1">kubernetes1.24-client-1.24.17-150300.7.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kubernetes1.24-client-bash-completion-1.24.17-150300.7.6.1">
      <FullProductName ProductID="kubernetes1.24-client-bash-completion-1.24.17-150300.7.6.1">kubernetes1.24-client-bash-completion-1.24.17-150300.7.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kubernetes1.24-client-common-1.24.17-150300.7.6.1">
      <FullProductName ProductID="kubernetes1.24-client-common-1.24.17-150300.7.6.1">kubernetes1.24-client-common-1.24.17-150300.7.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kubernetes1.24-client-fish-completion-1.24.17-150300.7.6.1">
      <FullProductName ProductID="kubernetes1.24-client-fish-completion-1.24.17-150300.7.6.1">kubernetes1.24-client-fish-completion-1.24.17-150300.7.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kubernetes1.24-controller-manager-1.24.17-150300.7.6.1">
      <FullProductName ProductID="kubernetes1.24-controller-manager-1.24.17-150300.7.6.1">kubernetes1.24-controller-manager-1.24.17-150300.7.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kubernetes1.24-kubeadm-1.24.17-150300.7.6.1">
      <FullProductName ProductID="kubernetes1.24-kubeadm-1.24.17-150300.7.6.1">kubernetes1.24-kubeadm-1.24.17-150300.7.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kubernetes1.24-kubelet-1.24.17-150300.7.6.1">
      <FullProductName ProductID="kubernetes1.24-kubelet-1.24.17-150300.7.6.1">kubernetes1.24-kubelet-1.24.17-150300.7.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kubernetes1.24-kubelet-common-1.24.17-150300.7.6.1">
      <FullProductName ProductID="kubernetes1.24-kubelet-common-1.24.17-150300.7.6.1">kubernetes1.24-kubelet-common-1.24.17-150300.7.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kubernetes1.24-proxy-1.24.17-150300.7.6.1">
      <FullProductName ProductID="kubernetes1.24-proxy-1.24.17-150300.7.6.1">kubernetes1.24-proxy-1.24.17-150300.7.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kubernetes1.24-scheduler-1.24.17-150300.7.6.1">
      <FullProductName ProductID="kubernetes1.24-scheduler-1.24.17-150300.7.6.1">kubernetes1.24-scheduler-1.24.17-150300.7.6.1</FullProductName>
    </Branch>
    <Relationship ProductReference="kubernetes1.24-client-1.24.17-150300.7.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Enterprise Storage 7.1">
      <FullProductName ProductID="SUSE Enterprise Storage 7.1:kubernetes1.24-client-1.24.17-150300.7.6.1">kubernetes1.24-client-1.24.17-150300.7.6.1 as a component of SUSE Enterprise Storage 7.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kubernetes1.24-client-common-1.24.17-150300.7.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Enterprise Storage 7.1">
      <FullProductName ProductID="SUSE Enterprise Storage 7.1:kubernetes1.24-client-common-1.24.17-150300.7.6.1">kubernetes1.24-client-common-1.24.17-150300.7.6.1 as a component of SUSE Enterprise Storage 7.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="kubernetes1.24-client-1.24.17-150300.7.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.24-client-1.24.17-150300.7.6.1">kubernetes1.24-client-1.24.17-150300.7.6.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kubernetes1.24-client-common-1.24.17-150300.7.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.24-client-common-1.24.17-150300.7.6.1">kubernetes1.24-client-common-1.24.17-150300.7.6.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kubernetes1.24-client-1.24.17-150300.7.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.24-client-1.24.17-150300.7.6.1">kubernetes1.24-client-1.24.17-150300.7.6.1 as a component of SUSE Linux Enterprise Server 15 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kubernetes1.24-client-common-1.24.17-150300.7.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.24-client-common-1.24.17-150300.7.6.1">kubernetes1.24-client-common-1.24.17-150300.7.6.1 as a component of SUSE Linux Enterprise Server 15 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="kubernetes1.24-client-1.24.17-150300.7.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.24-client-1.24.17-150300.7.6.1">kubernetes1.24-client-1.24.17-150300.7.6.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="kubernetes1.24-client-common-1.24.17-150300.7.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.24-client-common-1.24.17-150300.7.6.1">kubernetes1.24-client-common-1.24.17-150300.7.6.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">kubectl does not neutralize escape, meta or control sequences contained in the raw data it outputs to a terminal. This includes but is not limited to the unstructured string fields in objects such as Events.</Note>
    </Notes>
    <CVE>CVE-2021-25743</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 7.1:kubernetes1.24-client-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:kubernetes1.24-client-common-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.24-client-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.24-client-common-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.24-client-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.24-client-common-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.24-client-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.24-client-common-1.24.17-150300.7.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20243343-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-25743.html</URL>
        <Description>CVE-2021-25743</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1194400</URL>
        <Description>SUSE Bug 1194400</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Users may be able to launch containers using images that are restricted by ImagePolicyWebhook when using ephemeral containers. Kubernetes clusters are only affected if the ImagePolicyWebhook admission plugin is used together with ephemeral containers.

</Note>
    </Notes>
    <CVE>CVE-2023-2727</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 7.1:kubernetes1.24-client-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:kubernetes1.24-client-common-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.24-client-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.24-client-common-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.24-client-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.24-client-common-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.24-client-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.24-client-common-1.24.17-150300.7.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20243343-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-2727.html</URL>
        <Description>CVE-2023-2727</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1211630</URL>
        <Description>SUSE Bug 1211630</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Users may be able to launch containers that bypass the mountable secrets policy enforced by the ServiceAccount admission plugin when using ephemeral containers. The policy ensures pods running with a service account may only reference secrets specified in the service account's secrets field. Kubernetes clusters are only affected if the ServiceAccount admission plugin and the `kubernetes.io/enforce-mountable-secrets` annotation are used together with ephemeral containers.

</Note>
    </Notes>
    <CVE>CVE-2023-2728</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 7.1:kubernetes1.24-client-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:kubernetes1.24-client-common-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.24-client-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.24-client-common-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.24-client-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.24-client-common-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.24-client-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.24-client-common-1.24.17-150300.7.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20243343-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-2728.html</URL>
        <Description>CVE-2023-2728</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1211631</URL>
        <Description>SUSE Bug 1211631</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing. With the fix applied, HTTP/2 servers now bound the number of simultaneously executing handler goroutines to the stream concurrency limit (MaxConcurrentStreams). New requests arriving when at the limit (which can only happen after the client has reset an existing, in-flight request) will be queued until a handler exits. If the request queue grows too large, the server will terminate the connection. This issue is also fixed in golang.org/x/net/http2 for users manually configuring HTTP/2. The default stream concurrency limit is 250 streams (requests) per HTTP/2 connection. This value may be adjusted using the golang.org/x/net/http2 package; see the Server.MaxConcurrentStreams setting and the ConfigureServer function.</Note>
    </Notes>
    <CVE>CVE-2023-39325</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 7.1:kubernetes1.24-client-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:kubernetes1.24-client-common-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.24-client-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.24-client-common-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.24-client-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.24-client-common-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.24-client-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.24-client-common-1.24.17-150300.7.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20243343-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-39325.html</URL>
        <Description>CVE-2023-39325</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1216109</URL>
        <Description>SUSE Bug 1216109</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1230323</URL>
        <Description>SUSE Bug 1230323</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.</Note>
    </Notes>
    <CVE>CVE-2023-44487</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 7.1:kubernetes1.24-client-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:kubernetes1.24-client-common-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.24-client-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.24-client-common-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.24-client-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.24-client-common-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.24-client-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.24-client-common-1.24.17-150300.7.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20243343-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-44487.html</URL>
        <Description>CVE-2023-44487</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1216109</URL>
        <Description>SUSE Bug 1216109</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1216123</URL>
        <Description>SUSE Bug 1216123</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1216169</URL>
        <Description>SUSE Bug 1216169</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1216171</URL>
        <Description>SUSE Bug 1216171</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1216174</URL>
        <Description>SUSE Bug 1216174</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1216176</URL>
        <Description>SUSE Bug 1216176</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1216181</URL>
        <Description>SUSE Bug 1216181</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1216182</URL>
        <Description>SUSE Bug 1216182</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1216190</URL>
        <Description>SUSE Bug 1216190</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.</Note>
    </Notes>
    <CVE>CVE-2023-45288</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 7.1:kubernetes1.24-client-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:kubernetes1.24-client-common-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.24-client-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.24-client-common-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.24-client-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.24-client-common-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.24-client-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.24-client-common-1.24.17-150300.7.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20243343-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-45288.html</URL>
        <Description>CVE-2023-45288</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1221400</URL>
        <Description>SUSE Bug 1221400</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in kube-controller-manager. This issue occurs when the initial application of a HPA config YAML lacking a .spec.behavior.scaleUp block causes a denial of service due to KCM pods going into restart churn.</Note>
    </Notes>
    <CVE>CVE-2024-0793</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 7.1:kubernetes1.24-client-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:kubernetes1.24-client-common-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.24-client-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.24-client-common-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.24-client-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.24-client-common-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.24-client-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.24-client-common-1.24.17-150300.7.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20243343-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-0793.html</URL>
        <Description>CVE-2024-0793</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1219964</URL>
        <Description>SUSE Bug 1219964</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The protojson.Unmarshal function can enter an infinite loop when unmarshaling certain forms of invalid JSON. This condition can occur when unmarshaling into a message which contains a google.protobuf.Any value, or when the UnmarshalOptions.DiscardUnknown option is set.</Note>
    </Notes>
    <CVE>CVE-2024-24786</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 7.1:kubernetes1.24-client-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:kubernetes1.24-client-common-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.24-client-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.24-client-common-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.24-client-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.24-client-common-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.24-client-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.24-client-common-1.24.17-150300.7.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20243343-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-24786.html</URL>
        <Description>CVE-2024-24786</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1226136</URL>
        <Description>SUSE Bug 1226136</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A security issue was discovered in Kubernetes where users may be able to launch containers that bypass the mountable secrets policy enforced by the ServiceAccount admission plugin when using containers, init containers, and ephemeral containers with the envFrom field populated. The policy ensures pods running with a service account may only reference secrets specified in the service account's secrets field. Kubernetes clusters are only affected if the ServiceAccount admission plugin and the kubernetes.io/enforce-mountable-secrets annotation are used together with containers, init containers, and ephemeral containers with the envFrom field populated.</Note>
    </Notes>
    <CVE>CVE-2024-3177</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 7.1:kubernetes1.24-client-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:kubernetes1.24-client-common-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.24-client-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.24-client-common-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.24-client-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.24-client-common-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.24-client-1.24.17-150300.7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.24-client-common-1.24.17-150300.7.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20243343-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-3177.html</URL>
        <Description>CVE-2024-3177</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222539</URL>
        <Description>SUSE Bug 1222539</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
