[RHSA-2023:1014-01] Important: Red Hat OpenStack Platform 17.0 (etcd) security update

Security announcements for all Red Hat products and services. rhsa-announce at redhat.com
Tue Feb 28 18:29:10 UTC 2023


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: Red Hat OpenStack Platform 17.0 (etcd) security update
Advisory ID:       RHSA-2023:1014-01
Product:           Red Hat OpenStack Platform
Advisory URL:      https://access.redhat.com/errata/RHSA-2023:1014
Issue date:        2023-02-28
CVE Names:         CVE-2022-3064 
=====================================================================

1. Summary:

An update for etcd is now available for Red Hat OpenStack Platform 17.0
(Wallaby).

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat OpenStack Platform 17.0 - x86_64

3. Description:

A highly-available key value store for shared configuration

Security Fix(es):

* Improve heuristics preventing CPU/memory abuse by parsing malicious or
large YAML documents (CVE-2022-3064)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

2163037 - CVE-2022-3064 go-yaml: Improve heuristics preventing CPU/memory abuse by parsing malicious or large YAML documents

6. Package List:

Red Hat OpenStack Platform 17.0:

Source:
etcd-3.4.14-3.el9ost.src.rpm

x86_64:
etcd-3.4.14-3.el9ost.x86_64.rpm
etcd-debuginfo-3.4.14-3.el9ost.x86_64.rpm
etcd-debugsource-3.4.14-3.el9ost.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2022-3064
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert at redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=FbFk
-----END PGP SIGNATURE-----


More information about the RHSA-announce mailing list