First published: Wed May 22 2024(Updated: )
A highly-available key value store for shared configuration<br>Security Fix(es):<br><li> golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads (CVE-2024-1394)</li> <li> net/http/internal: Denial of Service (DoS) via Resource Consumption via</li> HTTP requests (CVE-2023-39326)<br><li> crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges.</li> (CVE-2023-45287)<br><li> net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS (CVE-2023-45288)</li> <li> etcd: Incomplete fix for CVE-2023-39325/CVE-2023-44487 in OpenStack Platform (CVE-2024-4438)</li> For more details about the security issue(s), including the impact, a CVSS<br>score, acknowledgments, and other related information, refer to the CVE<br>page listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/etcd | <3.4.26-8.el9 | 3.4.26-8.el9 |
redhat/etcd-debuginfo | <3.4.26-8.el9 | 3.4.26-8.el9 |
redhat/etcd-debugsource | <3.4.26-8.el9 | 3.4.26-8.el9 |
Red Hat OpenStack Services on OpenShift |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:2729 is critical due to the denial of service vulnerability.
To fix RHSA-2024:2729, upgrade to etcd version 3.4.26-8.el9 immediately.
RHSA-2024:2729 addresses memory leaks in RSA payloads and a denial of service vulnerability via resource consumption.
If you are using etcd version older than 3.4.26-8.el9, you are affected by RHSA-2024:2729.
All users of the affected Red Hat packages should apply the patch for RHSA-2024:2729 to ensure security.