CVE-2025-32777

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-32777
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-32777.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-32777
Aliases
Published
2025-04-30T19:15:55Z
Modified
2025-05-28T10:28:17.902514Z
Summary
[none]
Details

Volcano is a Kubernetes-native batch scheduling system. Prior to versions 1.11.2, 1.10.2, 1.9.1, 1.11.0-network-topology-preview.3, and 1.12.0-alpha.2, attacker compromise of either the Elastic service or the extender plugin can cause denial of service of the scheduler. This is a privilege escalation, because Volcano users may run their Elastic service and extender plugins in separate pods or nodes from the scheduler. In the Kubernetes security model, node isolation is a security boundary, and as such an attacker is able to cross that boundary in Volcano's case if they have compromised either the vulnerable services or the pod/node in which they are deployed. The scheduler will become unavailable to other users and workloads in the cluster. The scheduler will either crash with an unrecoverable OOM panic or freeze while consuming excessive amounts of memory. This issue has been patched in versions 1.11.2, 1.10.2, 1.9.1, 1.11.0-network-topology-preview.3, and 1.12.0-alpha.2.

References

Affected packages

Git / github.com/volcano-sh/volcano

Affected ranges

Type
GIT
Repo
https://github.com/volcano-sh/volcano
Events

Affected versions

v0.*

v0.1

v1.*

v1.10.0
v1.10.0-alpha.0
v1.10.1
v1.11.0
v1.11.0-network-topology-preview.0
v1.11.0-network-topology-preview.2
v1.11.1
v1.12.0-alpha.0
v1.12.0-alpha.1
v1.3.0
v1.4.0-Beta
v1.8.0-alpha.0
v1.9.0
v1.9.0-alpha.0