First published: Wed May 29 2024(Updated: )
A highly-available key value store for shared configuration<br>Security Fix(es):<br><li> Incomplete fix for CVE-2023-39325/CVE-2023-44487 in OpenStack Platform</li> (CVE-2024-4438)<br><li> Incomplete fix for CVE-2021-44716 in OpenStack Platform (CVE-2024-4437)</li> <li> Incomplete fix for CVE-2022-41723 in OpenStack Platform (CVE-2024-4436)</li> <li> golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS (CVE-2023-45288)</li> <li> golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests (CVE-2023-39326)</li> <li> golang: crypto/tls: lack of a limit on buffered post-handshake (CVE-2023-39322)</li> <li> golang: crypto/tls: panic when processing post-handshake message on QUIC connections (CVE-2023-39321)</li> <li> golang: html/template: improper handling of special tags within script contexts (CVE-2023-39319)</li> <li> golang: html/template: improper handling of HTML-like comments within script contexts (CVE-2023-39318</li> For more details about the security issue(s), including the impact, a CVSS<br>score, acknowledgments, and other related information, refer to the CVE<br>page listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Red Hat OpenStack | ||
Red Hat Red Hat OpenStack for IBM Power | ||
redhat/etcd | <3.3.23-16.el8 | 3.3.23-16.el8 |
redhat/etcd-debuginfo | <3.3.23-16.el8 | 3.3.23-16.el8 |
redhat/etcd-debugsource | <3.3.23-16.el8 | 3.3.23-16.el8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.