{"schema_version":"1.7.2","id":"OESA-2025-1168","modified":"2025-02-21T13:37:05Z","published":"2025-02-21T13:37:05Z","upstream":["CVE-2021-28235","CVE-2022-3064","CVE-2022-34038","CVE-2022-41723","CVE-2023-32082"],"summary":"etcd security update","details":"%{expand:\r\n\r\nSecurity Fix(es):\n\nAuthentication vulnerability found in Etcd-io v.3.4.10 allows remote attackers to escalate privileges via the debug function.(CVE-2021-28235)\n\nParsing malicious or large YAML documents can consume excessive amounts of CPU or memory.(CVE-2022-3064)\n\nEtcd v3.5.4 allows remote attackers to cause a denial of service via function PageWriter.write in pagewriter.go. NOTE: the vendor\u0026apos;s position is that this is not a vulnerability.(CVE-2022-34038)\n\nA maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests.(CVE-2022-41723)\n\netcd is a distributed key-value store for the data of a distributed system. Prior to versions 3.4.26 and 3.5.9, the LeaseTimeToLive API allows access to key names (not value) associated to a lease when `Keys` parameter is true, even a user doesn\u0026apos;t have read permission to the keys. The impact is limited to a cluster which enables auth (RBAC). Versions 3.4.26 and 3.5.9 fix this issue. There are no known workarounds.(CVE-2023-32082)","affected":[{"package":{"ecosystem":"openEuler:20.03-LTS-SP4","name":"etcd","purl":"pkg:rpm/openEuler/etcd\u0026distro=openEuler-20.03-LTS-SP4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.4.14-9.oe2003sp4"}]}],"ecosystem_specific":{"aarch64":["etcd-3.4.14-9.oe2003sp4.aarch64.rpm"],"src":["etcd-3.4.14-9.oe2003sp4.src.rpm"],"x86_64":["etcd-3.4.14-9.oe2003sp4.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1168"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-28235"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3064"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-34038"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41723"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-32082"}],"database_specific":{"severity":"Critical"}}