etcd is vulnerable to denial of service (DoS). It does not handle the case when an entry index is greater then the number of entries in the ReadAll method in wal/wal.go, leading to issues when WAL entries are being read during consensus as an arbitrary etcd consensus participant and causing a runtime panic when reading the entry.
access.redhat.com/errata/RHSA-2021:0916
access.redhat.com/security/updates/classification/#moderate
bugzilla.redhat.com/show_bug.cgi?id=1868872
github.com/etcd-io/etcd/security/advisories/GHSA-m332-53r6-2w93
lists.fedoraproject.org/archives/list/[email protected]/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP/