Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2023:3445 - Security Advisory
Issued:
2023-06-05
Updated:
2023-06-05

RHSA-2023:3445 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: Red Hat OpenStack Platform 16.2 (etcd) security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for etcd is now available for Red Hat OpenStack Platform 16.2
(Train).

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

Description

A highly-available key value store for shared configuration

Security Fix(es):

  • Information discosure via debug function (CVE-2021-28235)
  • html/template: improper handling of JavaScript whitespace

(CVE-2023-24540)

  • golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding

(CVE-2022-41723)

  • crypto/tls: large handshake records may cause panics (CVE-2022-41724)
  • net/http mime/multipart: denial of service from excessive resource

consumption (CVE-2022-41725)

  • net/http net/textproto: denial of service from excessive memory

allocation (CVE-2023-24534)

  • net/http net/textproto mime/multipart: denial of service from excessive

resource consumption (CVE-2023-24536)

  • go/parser: Infinite loop in parsing (CVE-2023-24537)
  • html/template: backticks not treated as string delimiters

(CVE-2023-24538)

  • html/template: improper sanitization of CSS values (CVE-2023-24539)
  • html/template: improper handling of empty HTML attributes

(CVE-2023-29400)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page listed in the References section.

Solution

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat OpenStack for IBM Power 16.2 ppc64le
  • Red Hat OpenStack 16.2 x86_64

Fixes

  • BZ - 2178358 - CVE-2022-41723 net/http, golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding
  • BZ - 2178488 - CVE-2022-41725 golang: net/http, mime/multipart: denial of service from excessive resource consumption
  • BZ - 2178492 - CVE-2022-41724 golang: crypto/tls: large handshake records may cause panics
  • BZ - 2184441 - CVE-2021-28235 etcd: Information discosure via debug function
  • BZ - 2184481 - CVE-2023-24538 golang: html/template: backticks not treated as string delimiters
  • BZ - 2184482 - CVE-2023-24536 golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption
  • BZ - 2184483 - CVE-2023-24534 golang: net/http, net/textproto: denial of service from excessive memory allocation
  • BZ - 2184484 - CVE-2023-24537 golang: go/parser: Infinite loop in parsing
  • BZ - 2196026 - CVE-2023-24539 golang: html/template: improper sanitization of CSS values
  • BZ - 2196027 - CVE-2023-24540 golang: html/template: improper handling of JavaScript whitespace
  • BZ - 2196029 - CVE-2023-29400 golang: html/template: improper handling of empty HTML attributes

CVEs

  • CVE-2021-28235
  • CVE-2022-41723
  • CVE-2022-41724
  • CVE-2022-41725
  • CVE-2023-24534
  • CVE-2023-24536
  • CVE-2023-24537
  • CVE-2023-24538
  • CVE-2023-24539
  • CVE-2023-24540
  • CVE-2023-29400

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat OpenStack for IBM Power 16.2

SRPM
etcd-3.3.23-14.el8ost.src.rpm SHA-256: bd0f6740cb947a78f4f62750d547bc4d018e9f5161add5f673fd6e51502ec793
ppc64le
etcd-3.3.23-14.el8ost.ppc64le.rpm SHA-256: 80bdebd87457107d5162e9ba44abc07d5a75c9f0ab15f0128091ef845673de1b
etcd-debuginfo-3.3.23-14.el8ost.ppc64le.rpm SHA-256: 7e2e3879e5b67ed40ffa7dab68d3caab6fd2ccac843ee48c6fc125d28c885d2f
etcd-debugsource-3.3.23-14.el8ost.ppc64le.rpm SHA-256: d8a63168c0085ff11e112bbbd914d6c84ac5b03f467f7353f021de38ea294378

Red Hat OpenStack 16.2

SRPM
etcd-3.3.23-14.el8ost.src.rpm SHA-256: bd0f6740cb947a78f4f62750d547bc4d018e9f5161add5f673fd6e51502ec793
x86_64
etcd-3.3.23-14.el8ost.x86_64.rpm SHA-256: 489915ddd31fba340a275c6dd5869ff980f9461b2659486f9a25b9131d66a791
etcd-debuginfo-3.3.23-14.el8ost.x86_64.rpm SHA-256: b10c3778a47b358d11dfcbce90720c4d9d415ad3ec8370ff6cfe032319395b2d
etcd-debugsource-3.3.23-14.el8ost.x86_64.rpm SHA-256: d074fd7fb981e26dfb63f17106e66f6bba5645945eb0744520c0a95c9cb76b5f

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
2023
  • Privacy Statement
  • Terms of Use
  • All Policies and Guidelines
We've updated our <a href='http://www.redhat.com/en/about/privacy-policy' class='privacy-policy'>Privacy Statement</a> effective September 15, 2023.
Red Hat Summit Red Hat Summit
Twitter