- Issued:
- 2023-03-15
- Updated:
- 2023-03-15
RHSA-2023:1275 - Important: Red Hat OpenStack Platform etcd - security update
Synopsis
Important: Red Hat OpenStack Platform (etcd) security update
Type/Severity
Security Advisory Important
Topic
An update for etcd is now available for Red Hat OpenStack Platform.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
etcd is a highly-available key value store for shared configuration.
The following Important impact security fix(es) are applicable to Red Hat OpenStack Platform 17.0 (Wallaby), 16.2 (Train), and 16.1 (Train):
- Improve heuristics preventing CPU/memory abuse by parsing malicious or large YAML documents (CVE-2022-3064)
As a result of being built by golang 1.18.9, the following Moderate impact security fix(es) are applicable to Red Hat OpenStack Platform 16.2 and 16.1:
- golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)
- golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880)
- golang: net/http: handle server errors after sending GOAWAY (CVE-2022-27664)
- golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)
- golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)
- golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635)
- golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)
- golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715)
- golang: net/http: An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests (CVE-2022-41717)
As a result of being built by golang 1.18.9, the following Low impact security fix(es) are applicable to Red Hat OpenStack Platform 16.2 and 16.1:
- golang: crypto/tls: session tickets lack random ticket_age_add (CVE-2022-30629)
- golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service (CVE-2022-32189)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section.
Solution
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat OpenStack | 16.2 | x86_64 |
| Red Hat OpenStack | 16.1 | x86_64 |
| Red Hat OpenStack for IBM Power | 16.2 | ppc64le |
| Red Hat OpenStack for IBM Power | 16.1 | ppc64le |
Updated Packages
- etcd-3.3.23-12.el8ost.ppc64le.rpm
- etcd-3.3.23-12.el8ost.src.rpm
- etcd-debuginfo-3.3.23-12.el8ost.ppc64le.rpm
- etcd-debugsource-3.3.23-12.el8ost.ppc64le.rpm
- etcd-3.3.23-12.el8ost.x86_64.rpm
- etcd-debuginfo-3.3.23-12.el8ost.x86_64.rpm
- etcd-debugsource-3.3.23-12.el8ost.x86_64.rpm
Fixes
- This content is not included.BZ - 2092793
- This content is not included.BZ - 2107371
- This content is not included.BZ - 2107374
- This content is not included.BZ - 2107383
- This content is not included.BZ - 2107386
- This content is not included.BZ - 2107388
- This content is not included.BZ - 2113814
- This content is not included.BZ - 2124669
- This content is not included.BZ - 2132868
- This content is not included.BZ - 2132872
- This content is not included.BZ - 2161274
- This content is not included.BZ - 2163037
CVEs
- CVE-2022-1705
- CVE-2022-2880
- CVE-2022-3064
- CVE-2022-27664
- CVE-2022-30629
- CVE-2022-30630
- CVE-2022-30632
- CVE-2022-30635
- CVE-2022-32148
- CVE-2022-32189
- CVE-2022-41715
- CVE-2022-41717
References
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.