First published: Wed Aug 05 2020(Updated: )
A flaw was found in etcd, where it is possible to have an entry index greater than the number of entries in the ReadAll method in wal/wal.go. This can cause issues when WAL entries are being read during consensus, as an arbitrary etcd consensus participant can go down from a runtime panic when reading the entry. The highest threat from this vulnerability is to system availability.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/etcd | <0:3.2.32-1.el7_9 | 0:3.2.32-1.el7_9 |
redhat/etcd | <0:3.3.23-1.el8 | 0:3.3.23-1.el8 |
redhat/etcd | <3.4.10 | 3.4.10 |
redhat/etcd | <3.3.23 | 3.3.23 |
etcd | <3.3.23 | |
etcd | >=3.4.0<3.4.10 | |
Fedora | =32 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2020-15112 is a vulnerability found in etcd versions 3.3.23 and 3.4.10.
The severity of CVE-2020-15112 is medium with a CVSS score of 6.5.
CVE-2020-15112 affects etcd versions 3.3.23 and 3.4.10.
To fix CVE-2020-15112, update etcd to version 3.4.10 or 3.3.23, depending on your current version.
More information about CVE-2020-15112 can be found in the following references: - [GitHub Security Advisory](https://github.com/etcd-io/etcd/security/advisories/GHSA-m332-53r6-2w93) - [Red Hat Bugzilla](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1868873) - [etcd GitHub commit](https://github.com/etcd-io/etcd/commit/4571e528f49625d3de3170f219a45c3b3d38c675)