摘要:
etcd security update
安全等级: Medium
公告ID: KylinSec-SA-2025-1629
发布日期: 2025年3月18日
关联CVE: CVE-2024-9355
%{expand:
Security Fix(es):
A vulnerability was found in Golang FIPS OpenSSL. This flaw allows a malicious user to randomly cause an uninitialized buffer length variable with a zeroed buffer to be returned in FIPS mode. It may also be possible to force a false positive match between non-equal hashes when comparing a trusted computed hmac sum to an untrusted input sum if an attacker can send a zeroed buffer in place of a pre-computed sum. It is also possible to force a derived key to be all zeros instead of an unpredictable value. This may have follow-on implications for the Go TLS stack.(CVE-2024-9355)
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2024-9355 | V6 | podman | Fixed |
软件名称 | 架构 | 版本号 |
---|---|---|
etcd | x86_64 | 3.4.14-15.ks6.kb1 |
etcd | aarch64 | 3.4.14-15.ks6.kb1 |
方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm
方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名