First published: Mon Jun 05 2023(Updated: )
A highly-available key value store for shared configuration<br>Security Fix(es):<br><li> Information discosure via debug function (CVE-2021-28235)</li> <li> golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding</li> (CVE-2022-41723)<br>For more details about the security issue(s), including the impact, a CVSS<br>score, acknowledgments, and other related information, refer to the CVE<br>page listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/etcd | <3.3.23-14.el8 | 3.3.23-14.el8 |
redhat/etcd-debuginfo | <3.3.23-14.el8 | 3.3.23-14.el8 |
redhat/etcd-debugsource | <3.3.23-14.el8 | 3.3.23-14.el8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2023:3447 is classified as important.
To fix RHSA-2023:3447, upgrade to etcd version 3.3.23-14.el8.
RHSA-2023:3447 addresses CVE-2021-28235 for information disclosure and CVE-2022-41723 for performance issues in HPACK decoding.
The affected packages in RHSA-2023:3447 include etcd, etcd-debuginfo, and etcd-debugsource.
Currently, the recommended action is to apply the update rather than seeking a workaround.