First published: Mon Feb 10 2025(Updated: )
A highly-available key value store for shared configuration<br>Security Fix(es):<br><li> golang: Calling Decoder.Decode on a message which contains deeply nested</li> structures can cause a panic due to stack exhaustion (CVE-2024-34156)<br>For more details about the security issue(s), including the impact, a CVSS<br>score, acknowledgments, and other related information, refer to the CVE<br>page listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/etcd | <3.4.26-9.1.el9 | 3.4.26-9.1.el9 |
redhat/etcd-debuginfo | <3.4.26-9.1.el9 | 3.4.26-9.1.el9 |
redhat/etcd-debugsource | <3.4.26-9.1.el9 | 3.4.26-9.1.el9 |
Red Hat OpenStack Services on OpenShift |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2025:1190 is classified as important due to the potential for stack exhaustion leading to a panic.
To fix RHSA-2025:1190, update the etcd, etcd-debuginfo, and etcd-debugsource packages to version 3.4.26-9.1.el9.
RHSA-2025:1190 affects the etcd, etcd-debuginfo, and etcd-debugsource packages in Red Hat Enterprise Linux 9.
RHSA-2025:1190 addresses a vulnerability (CVE-2024-34156) that can cause a panic in the golang Decoder.Decode function on deeply nested messages.
As of now, there is no specific workaround for RHSA-2025:1190 other than applying the recommended updates.