First published: Mon Aug 15 2022(Updated: )
The etcd packages provide a highly available key-value store for shared configuration.<br>Security Fix(es):<br><li> golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)</li> <li> prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/etcd | <3.3.23-10.el8 | 3.3.23-10.el8 |
redhat/etcd-debuginfo | <3.3.23-10.el8 | 3.3.23-10.el8 |
redhat/etcd-debugsource | <3.3.23-10.el8 | 3.3.23-10.el8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2022:6061 is classified as important.
To fix RHSA-2022:6061, you should upgrade to etcd package version 3.3.23-10.el8.
RHSA-2022:6061 addresses vulnerabilities including CVE-2022-30631 which concerns a stack exhaustion issue in golang's compress/gzip.
The affected packages in RHSA-2022:6061 include etcd, etcd-debuginfo, and etcd-debugsource.
Yes, RHSA-2022:6061 includes a denial of service vulnerability related to the prometheus/client_golang InstrumentHandlerCounter.