logo

CVE-2025-32777 volcano.sh/volcano

Package

Manager: go
Name: volcano.sh/volcano
Vulnerable Version: >=0 <1.9.1 || >=1.10.0-alpha.0 <1.10.2 || >=1.11.0-network-topology-preview.0 <1.11.0-network-topology-preview.3 || >=1.11.0 <1.11.2 || >=1.12.0-alpha.0 <1.12.0-alpha.2

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:U/RC:R

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:H/SA:H

EPSS: 0.00156 pctl0.36988

Details

Volcano Scheduler Denial of Service via Unbounded Response from Elastic Service/extender Plugin ### Impact This issue allows an attacker who has compromised either the Elastic service or the extender plugin to cause denial of service of the scheduler. This is a privilege escalation, because Volcano users may run their Elastic service and extender plugins in separate pods or nodes from the scheduler. In the Kubernetes security model, node isolation is a security boundary, and as such an attacker is able to cross that boundary in Volcano's case if they have compromised either the vulnerable services or the pod/node in which they are deployed. The scheduler will become unavailable to other users and workloads in the cluster. The scheduler will either crash with an unrecoverable OOM panic or freeze while consuming excessive amounts of memory. ### Workarounds No

Metadata

Created: 2025-04-30T16:40:03Z
Modified: 2025-05-06T19:12:07Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/04/GHSA-hg79-fw4p-25p8/GHSA-hg79-fw4p-25p8.json
CWE IDs: ["CWE-770"]
Alternative ID: GHSA-hg79-fw4p-25p8
Finding: F002
Auto approve: 1