{"id":"RHSA-2024:3467","summary":"Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (etcd) security update","modified":"2026-04-04T10:02:35Z","published":"2024-09-30T15:53:26Z","related":["GO-2023-2382","GO-2024-2687"],"upstream":["CVE-2023-39318","CVE-2023-39319","CVE-2023-39321","CVE-2023-39322","CVE-2023-39326","CVE-2023-45288","CVE-2024-4436","CVE-2024-4437","CVE-2024-4438"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:3467"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2237773"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2237776"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2237777"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2237778"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2253330"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2268273"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2279357"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2279361"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2279365"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_3467.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-39318"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-39318"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-39318"},{"type":"ARTICLE","url":"https://go.dev/cl/526156"},{"type":"ARTICLE","url":"https://go.dev/issue/62196"},{"type":"ARTICLE","url":"https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ"},{"type":"ARTICLE","url":"https://vuln.go.dev/ID/GO-2023-2041.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-39319"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-39319"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-39319"},{"type":"ARTICLE","url":"https://go.dev/cl/526157"},{"type":"ARTICLE","url":"https://go.dev/issue/62197"},{"type":"ARTICLE","url":"https://vuln.go.dev/ID/GO-2023-2043.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-39321"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-39321"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-39321"},{"type":"ARTICLE","url":"https://go.dev/cl/523039"},{"type":"ARTICLE","url":"https://go.dev/issue/62266"},{"type":"ARTICLE","url":"https://vuln.go.dev/ID/GO-2023-2044.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-39322"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-39322"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-39322"},{"type":"ARTICLE","url":"https://vuln.go.dev/ID/GO-2023-2045.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-39326"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-39326"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-39326"},{"type":"ADVISORY","url":"https://pkg.go.dev/vuln/GO-2023-2382"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-45288"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-45288"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-45288"},{"type":"ARTICLE","url":"https://nowotarski.info/http2-continuation-flood/"},{"type":"ADVISORY","url":"https://pkg.go.dev/vuln/GO-2024-2687"},{"type":"ADVISORY","url":"https://www.kb.cert.org/vuls/id/421644"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-4436"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-4436"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-4436"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-4437"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-4437"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-4437"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-4438"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-4438"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-4438"}],"affected":[{"package":{"name":"etcd","ecosystem":"Red Hat:openstack:16.1::el8","purl":"pkg:rpm/redhat/etcd"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.3.23-16.el8ost"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3467.json"}},{"package":{"name":"etcd-debuginfo","ecosystem":"Red Hat:openstack:16.1::el8","purl":"pkg:rpm/redhat/etcd-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.3.23-16.el8ost"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3467.json"}},{"package":{"name":"etcd-debugsource","ecosystem":"Red Hat:openstack:16.1::el8","purl":"pkg:rpm/redhat/etcd-debugsource"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.3.23-16.el8ost"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3467.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}