SUSE-SU-2025:0357-1: moderate: Security update for etcd
SLE-SECURITY-UPDATES
null at suse.de
Thu Feb 6 16:31:16 UTC 2025
# Security update for etcd
Announcement ID: SUSE-SU-2025:0357-1
Release Date: 2025-02-04T14:22:02Z
Rating: moderate
References:
* bsc#1095184
* bsc#1183703
Affected Products:
* openSUSE Leap 15.6
An update that has two security fixes can now be installed.
## Description:
This update for etcd fixes the following issues: Security Update to version
3.5.18:
* Ensure all goroutines created by StartEtcd to exit before closing the errc
* mvcc: restore tombstone index if it's first revision
* Bump go toolchain to 1.22.11
* Avoid deadlock in etcd.Close when stopping during bootstrapping
* etcdutl/etcdutl: use datadir package to build wal/snapdir
* Remove duplicated <-s.ReadyNotify()
* Do not wait for ready notify if the server is stopping
* Fix mixVersion test case: ensure a snapshot to be sent out
* *: support custom content check offline in v2store
* Print warning message for deprecated flags if set
* fix runtime error: comparing uncomparable type
* add tls min/max version to grpc proxy
* Fixing a configuration data loss bug: Fillup really really wants that the
template and the target file actually follow the sysconfig format. The
current config and the current template do not fulfill this requirement.
Move the current /etc/sysconfig/etcd to /etc/default/etcd and install a new
sysconfig file which only adds the ETCD_OPTIONS option, which is actually
used by the unit file. This also makes it a bit cleaner to move etcd to use
\--config-file in the long run.
* Update etcd configuration file based on https://github.com/etcd-
io/etcd/blob/v3.5.17/etcd.conf.yml.sample
Update to version 3.5.17:
* fix(defrag): close temp file in case of error
* Bump go toolchain to 1.22.9
* fix(defrag): handle defragdb failure
* fix(defrag): handle no space left error
* [3.5] Fix risk of a partial write txn being applied
* [serverWatchStream] terminate recvLoop on sws.close()
Update to version 3.5.16:
* Bump go toolchain to 1.22.7
* Introduce compaction sleep interval flag
* Fix passing default grpc call options in Kubernetes client
* Skip leadership check if the etcd instance is active processing heartbeats
* Introduce Kubernetes KV interface to etcd client
Update to version 3.5.15:
* Differentiate the warning message for rejected client and peer
* connections
* Suppress noisy basic auth token deletion log
* Support multiple values for allowed client and peer TLS identities(#18015)
* print error log when validation on conf change failed
Update to version 3.5.14:
* etcdutl: Fix snapshot restore memory alloc issue
* server: Implement WithMmapSize option for backend config
* gRPC health server sets serving status to NOT_SERVING on defrag
* server/mvcc: introduce compactBeforeSetFinishedCompact failpoint
* Update the compaction log when bootstrap and update compact's signature
* add experimental-snapshot-catchup-entries flag.
* Fix retry requests when receiving ErrGPRCNotSupportedForLearner
Update to version 3.5.13:
* Fix progress notification for watch that doesn't get any events
* pkg/types: Support Unix sockets in NewURLS
* added arguments to the grpc-proxy: dial-keepalive-time, dial-keepalive-
timeout, permit-without-stream
* server: fix comment to match function name
* Make CGO_ENABLED configurable for etcd 3.5
* etcdserver: drain leaky goroutines before test completed
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2025-357=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* etcdctl-3.5.18-150000.7.9.1
* etcd-3.5.18-150000.7.9.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1095184
* https://bugzilla.suse.com/show_bug.cgi?id=1183703
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20250206/9a09046d/attachment.htm>
More information about the sle-security-updates
mailing list