Lucene search

K
redhatRedHatRHSA-2024:3352
HistoryMay 23, 2024 - 2:55 p.m.

(RHSA-2024:3352) Important: Red Hat OpenStack Platform 16.2 (etcd) security update

2024-05-2314:55:17
access.redhat.com
4
red hat openstack
etcd
security update
incomplete fixes
cve
golang security
dos
shared configuration
key value store

7.3 High

AI Score

Confidence

Low

0.732 High

EPSS

Percentile

98.1%

A highly-available key value store for shared configuration

Security Fix(es):

  • Incomplete fix for CVE-2023-39325/CVE-2023-44487 in OpenStack Platform
    (CVE-2024-4438)

  • Incomplete fix for CVE-2021-44716 in OpenStack Platform (CVE-2024-4437)

  • Incomplete fix for CVE-2022-41723 in OpenStack Platform (CVE-2024-4436)

  • golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS (CVE-2023-45288)

  • golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests (CVE-2023-39326)

  • golang: crypto/tls: lack of a limit on buffered post-handshake (CVE-2023-39322)

  • golang: crypto/tls: panic when processing post-handshake message on QUIC connections (CVE-2023-39321)

  • golang: html/template: improper handling of special tags within script contexts (CVE-2023-39319)

  • golang: html/template: improper handling of HTML-like comments within script contexts (CVE-2023-39318

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page listed in the References section.