Skip to content

Volcano Scheduler Denial of Service via Unbounded Response from Elastic Service/extender Plugin

High
kevin-wangzefeng published GHSA-hg79-fw4p-25p8 Apr 30, 2025

Package

gomod volcano-sh/volcano (Go)

Affected versions

< v1.11.2, < v1.10.2, < v1.9.1, < v1.11.0-network-topology-preview.3, < v1.12.0-alpha.2

Patched versions

v1.11.2, v1.10.2, v1.9.1, v1.11.0-network-topology-preview.3, v1.12.0-alpha.2

Description

Impact

This issue allows an attacker who has compromised either the Elastic service or the extender plugin to cause denial of service of the scheduler. This is a privilege escalation, because Volcano users may run their Elastic service and extender plugins in separate pods or nodes from the scheduler. In the Kubernetes security model, node isolation is a security boundary, and as such an attacker is able to cross that boundary in Volcano's case if they have compromised either the vulnerable services or the pod/node in which they are deployed. The scheduler will become unavailable to other users and workloads in the cluster. The scheduler will either crash with an unrecoverable OOM panic or freeze while consuming excessive amounts of memory.

Patches

To be added.

Workarounds

No

Severity

High

CVE ID

CVE-2025-32777

Weaknesses

Uncontrolled Resource Consumption

The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources. Learn more on MITRE.

Credits