First published: Tue Jan 25 2022(Updated: )
A highly-available key value store for shared configuration<br>Security Fix(es):<br><li> net/<a href="http:" target="_blank">http:</a> limit growth of header canonicalization cache (CVE-2021-44716)</li> <li> net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)</li> <li> crypto/tls: certificate of wrong type is causing TLS client to panic</li> (CVE-2021-34558)<br>For more details about the security issue(s), including the impact, a CVSS<br>score, acknowledgments, and other related information, refer to the CVE<br>page listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/etcd | <3.3.23-7.el8 | 3.3.23-7.el8 |
redhat/etcd-debuginfo | <3.3.23-7.el8 | 3.3.23-7.el8 |
redhat/etcd-debugsource | <3.3.23-7.el8 | 3.3.23-7.el8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
RHSA-2022:0260 is classified as a moderate security vulnerability.
To fix RHSA-2022:0260, update to etcd version 3.3.23-7.el8 or higher.
RHSA-2022:0260 addresses CVE-2021-44716 and issues related to incorrect parsing of extraneous zero characters.
RHSA-2022:0260 affects the etcd package and its associated debuginfo and debugsource packages.
No, RHSA-2022:0260 is not considered a critical vulnerability, but it should still be addressed.