vulnerability
SUSE: CVE-2024-0793: SUSE Linux Security Advisory
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:N/AC:L/Au:S/C:N/I:N/A:C) | Apr 8, 2024 | Apr 9, 2024 | Dec 5, 2025 |
Severity
7
CVSS
(AV:N/AC:L/Au:S/C:N/I:N/A:C)
Published
Apr 8, 2024
Added
Apr 9, 2024
Modified
Dec 5, 2025
Description
A flaw was found in kube-controller-manager. This issue occurs when the initial application of a HPA config YAML lacking a .spec.behavior.scaleUp block causes a denial of service due to KCM pods going into restart churn.
Solutions
suse-upgrade-govulncheck-vulndbsuse-upgrade-kubernetes1-23-apiserversuse-upgrade-kubernetes1-23-clientsuse-upgrade-kubernetes1-23-client-bash-completionsuse-upgrade-kubernetes1-23-client-commonsuse-upgrade-kubernetes1-23-client-fish-completionsuse-upgrade-kubernetes1-23-controller-managersuse-upgrade-kubernetes1-23-kubeadmsuse-upgrade-kubernetes1-23-kubeletsuse-upgrade-kubernetes1-23-kubelet-commonsuse-upgrade-kubernetes1-23-proxysuse-upgrade-kubernetes1-23-schedulersuse-upgrade-kubernetes1-24-apiserversuse-upgrade-kubernetes1-24-clientsuse-upgrade-kubernetes1-24-client-bash-completionsuse-upgrade-kubernetes1-24-client-commonsuse-upgrade-kubernetes1-24-client-fish-completionsuse-upgrade-kubernetes1-24-controller-managersuse-upgrade-kubernetes1-24-kubeadmsuse-upgrade-kubernetes1-24-kubeletsuse-upgrade-kubernetes1-24-kubelet-commonsuse-upgrade-kubernetes1-24-proxysuse-upgrade-kubernetes1-24-schedulersuse-upgrade-kubernetes1-25-clientsuse-upgrade-kubernetes1-25-client-commonsuse-upgrade-kubernetes1-26-clientsuse-upgrade-kubernetes1-26-client-common
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.