openSUSE 15 Security Update : etcd (SUSE-SU-2025:0357-1)

medium Nessus Plugin ID 215181

Synopsis

The remote openSUSE host is missing a security update.

Description

The remote openSUSE 15 host has packages installed that are affected by a vulnerability as referenced in the SUSE- SU-2025:0357-1 advisory.

Security Update to version 3.5.18:

* Ensure all goroutines created by StartEtcd to exit before closing the errc
* mvcc: restore tombstone index if it's first revision
* Bump go toolchain to 1.22.11
* Avoid deadlock in etcd.Close when stopping during bootstrapping
* etcdutl/etcdutl: use datadir package to build wal/snapdir
* Remove duplicated <-s.ReadyNotify()
* Do not wait for ready notify if the server is stopping
* Fix mixVersion test case: ensure a snapshot to be sent out
* *: support custom content check offline in v2store
* Print warning message for deprecated flags if set
* fix runtime error: comparing uncomparable type
* add tls min/max version to grpc proxy

- Fixing a configuration data loss bug:
Fillup really really wants that the template and the target file actually follow the sysconfig format. The current config and the current template do not fulfill this requirement.
Move the current /etc/sysconfig/etcd to /etc/default/etcd and install a new sysconfig file which only adds the ETCD_OPTIONS option, which is actually used by the unit file.
This also makes it a bit cleaner to move etcd to use
--config-file in the long run.

- Update etcd configuration file based on https://github.com/etcd-io/etcd/blob/v3.5.17/etcd.conf.yml.sample

Update to version 3.5.17:

* fix(defrag): close temp file in case of error
* Bump go toolchain to 1.22.9
* fix(defrag): handle defragdb failure
* fix(defrag): handle no space left error
* [3.5] Fix risk of a partial write txn being applied
* [serverWatchStream] terminate recvLoop on sws.close()

Update to version 3.5.16:

* Bump go toolchain to 1.22.7
* Introduce compaction sleep interval flag
* Fix passing default grpc call options in Kubernetes client
* Skip leadership check if the etcd instance is active processing heartbeats
* Introduce Kubernetes KV interface to etcd client

Update to version 3.5.15:

* Differentiate the warning message for rejected client and peer
* connections
* Suppress noisy basic auth token deletion log
* Support multiple values for allowed client and peer TLS identities(#18015)
* print error log when validation on conf change failed

Update to version 3.5.14:

* etcdutl: Fix snapshot restore memory alloc issue
* server: Implement WithMmapSize option for backend config
* gRPC health server sets serving status to NOT_SERVING on defrag
* server/mvcc: introduce compactBeforeSetFinishedCompact failpoint
* Update the compaction log when bootstrap and update compact's signature
* add experimental-snapshot-catchup-entries flag.
* Fix retry requests when receiving ErrGPRCNotSupportedForLearner

Update to version 3.5.13:

* Fix progress notification for watch that doesn't get any events
* pkg/types: Support Unix sockets in NewURLS
* added arguments to the grpc-proxy: dial-keepalive-time, dial-keepalive-timeout, permit-without-stream
* server: fix comment to match function name
* Make CGO_ENABLED configurable for etcd 3.5
* etcdserver: drain leaky goroutines before test completed

Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected etcd and / or etcdctl packages.

See Also

https://bugzilla.suse.com/1095184

https://bugzilla.suse.com/1183703

http://www.nessus.org/u?36eafd8d

Plugin Details

Severity: Medium

ID: 215181

File Name: suse_SU-2025-0357-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 2/10/2025

Updated: 2/10/2025

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Vulnerability Information

CPE: cpe:/o:novell:suse_linux:15

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 2/4/2025

Vulnerability Publication Date: 2/4/2025

Reference Information

SuSE: SUSE-SU-2025:0357-1