摘要:
etcd security update
安全等级: Medium
公告ID: KylinSec-SA-2025-2667
发布日期: 2025年8月9日
%{expand:
Security Fix(es):
When parsing a multipart form (either explicitly with Request.ParseMultipartForm or implicitly with Request.FormValue, Request.PostFormValue, or Request.FormFile), limits on the total size of the parsed form were not applied to the memory consumed while reading a single form line. This permits a maliciously crafted input containing very long lines to cause allocation of arbitrarily large amounts of memory, potentially leading to memory exhaustion. With fix, the ParseMultipartForm function now correctly limits the maximum size of form lines.(CVE-2023-45290)
Verifying a certificate chain which contains a certificate with an unknown public key algorithm will cause Certificate.Verify to panic. This affects all crypto/tls clients, and servers that set Config.ClientAuth to VerifyClientCertIfGiven or RequireAndVerifyClientCert. The default behavior is for TLS servers to not verify client certificates.(CVE-2024-24783)
If errors returned from MarshalJSON methods contain user controlled data, they may be used to break the contextual auto-escaping behavior of the html/template package, allowing for subsequent actions to inject unexpected content into templates.(CVE-2024-24785)
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2024-24785 | V6 | golang | Fixed |
CVE-2023-45290 | V6 | golang | Fixed |
CVE-2024-24783 | V6 | golang | Fixed |
软件名称 | 架构 | 版本号 |
---|---|---|
etcd | x86_64 | 3.4.14-16.ks6.kb1 |
etcd | aarch64 | 3.4.14-16.ks6.kb1 |
方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm
方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名