First published: Wed Aug 05 2020(Updated: )
### Vulnerability type Access Controls ### Detail etcd creates certain directory paths (etcd data directory and the directory path when provided to automatically generate self-signed certificates for TLS connections with clients) with restricted access permissions (700) by using the os.MkdirAll. This function does not perform any permission checks when a given directory path exists already. ### Specific Go Package Affected github.com/etcd-io/etcd/pkg/fileutil ### Workarounds Make sure these directories have the desired permit (700). ### References Find out more on this vulnerability in the [security audit report](https://github.com/etcd-io/etcd/blob/master/security/SECURITY_AUDIT.pdf) ### For more information If you have any questions or comments about this advisory: * Contact the [etcd security committee](https://github.com/etcd-io/etcd/blob/master/security/security-release-process.md#product-security-committee-psc)
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/etcd | <0:3.3.23-1.el8 | 0:3.3.23-1.el8 |
redhat/etcd | <3.4.10 | 3.4.10 |
redhat/etcd | <3.3.23 | 3.3.23 |
go/github.com/etcd-io/etcd | <3.3.23 | 3.3.23 |
go/github.com/etcd-io/etcd | >=3.4.0-rc.0<3.4.10 | 3.4.10 |
etcd | <3.3.23 | |
etcd | >=3.4.0<3.4.10 | |
Fedora | =32 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-15113 is a vulnerability found in etcd that allows certain directory paths to be created with restricted access permissions.
CVE-2020-15113 has a severity rating of 7.1 (high).
etcd versions up to and including 3.3.23 and 3.4.10 are affected by CVE-2020-15113.
To fix CVE-2020-15113, update etcd to version 3.4.10 or apply the appropriate remedy provided by the vendor.
Yes, you can find references for CVE-2020-15113 at the following links:<ul><li><a href='https://github.com/etcd-io/etcd/security/advisories/GHSA-chh6-ppwq-jh92'>https://github.com/etcd-io/etcd/security/advisories/GHSA-chh6-ppwq-jh92</a></li><li><a href='https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1868871'>https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1868871</a></li><li><a href='https://access.redhat.com/errata/RHSA-2021:0916'>https://access.redhat.com/errata/RHSA-2021:0916</a></li></ul>