Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2020-15115
Vulnerability from cvelistv5
Published
2020-08-06 21:55
Modified
2024-08-04 13:08
Severity ?
EPSS score ?
Summary
etcd before versions 3.3.23 and 3.4.10 does not perform any password length validation, which allows for very short passwords, such as those with a length of one. This may allow an attacker to guess or brute-force users' passwords with little computational effort.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T13:08:21.734Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-4993-m7g5-r9hh" }, { "name": "FEDORA-2020-cd43b84c16", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "etcd", "vendor": "etcd-io", "versions": [ { "status": "affected", "version": "\u003c 3.3.23" }, { "status": "affected", "version": "\u003c 3.4.10" } ] } ], "descriptions": [ { "lang": "en", "value": "etcd before versions 3.3.23 and 3.4.10 does not perform any password length validation, which allows for very short passwords, such as those with a length of one. This may allow an attacker to guess or brute-force users\u0027 passwords with little computational effort." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-521", "description": "{\"CWE-521\":\"Weak Password Requirements\"}", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-04T02:06:11", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-4993-m7g5-r9hh" }, { "name": "FEDORA-2020-cd43b84c16", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP/" } ], "source": { "advisory": "GHSA-4993-m7g5-r9hh", "discovery": "UNKNOWN" }, "title": "No minimum password length in etcd", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2020-15115", "STATE": "PUBLIC", "TITLE": "No minimum password length in etcd" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "etcd", "version": { "version_data": [ { "version_value": "\u003c 3.3.23" }, { "version_value": "\u003c 3.4.10" } ] } } ] }, "vendor_name": "etcd-io" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "etcd before versions 3.3.23 and 3.4.10 does not perform any password length validation, which allows for very short passwords, such as those with a length of one. This may allow an attacker to guess or brute-force users\u0027 passwords with little computational effort." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "{\"CWE-521\":\"Weak Password Requirements\"}" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/etcd-io/etcd/security/advisories/GHSA-4993-m7g5-r9hh", "refsource": "CONFIRM", "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-4993-m7g5-r9hh" }, { "name": "FEDORA-2020-cd43b84c16", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP/" } ] }, "source": { "advisory": "GHSA-4993-m7g5-r9hh", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-15115", "datePublished": "2020-08-06T21:55:12", "dateReserved": "2020-06-25T00:00:00", "dateUpdated": "2024-08-04T13:08:21.734Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2020-15115\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2020-08-06T22:15:12.093\",\"lastModified\":\"2024-11-21T05:04:51.007\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"etcd before versions 3.3.23 and 3.4.10 does not perform any password length validation, which allows for very short passwords, such as those with a length of one. This may allow an attacker to guess or brute-force users\u0027 passwords with little computational effort.\"},{\"lang\":\"es\",\"value\":\"etcd anterior a las versiones 3.3.23 y 3.4.10, no lleva a cabo ninguna comprobaci\u00f3n de longitud de contrase\u00f1a, lo que permite contrase\u00f1as muy cortas, como aquellas con una longitud de uno. Esto puede permitir a un atacante adivinar o forzar las contrase\u00f1as de los usuarios con poco esfuerzo computacional\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N\",\"baseScore\":5.8,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-521\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-521\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:etcd:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.3.0\",\"versionEndExcluding\":\"3.3.23\",\"matchCriteriaId\":\"44C58F4F-02EB-40DC-86CB-98D027FE7F84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:etcd:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.4.0\",\"versionEndExcluding\":\"3.4.10\",\"matchCriteriaId\":\"362ED3D1-DC14-4BC6-A565-39EA4CA7B061\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36D96259-24BD-44E2-96D9-78CE1D41F956\"}]}]}],\"references\":[{\"url\":\"https://github.com/etcd-io/etcd/security/advisories/GHSA-4993-m7g5-r9hh\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP/\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/etcd-io/etcd/security/advisories/GHSA-4993-m7g5-r9hh\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
gsd-2020-15115
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
etcd before versions 3.3.23 and 3.4.10 does not perform any password length validation, which allows for very short passwords, such as those with a length of one. This may allow an attacker to guess or brute-force users' passwords with little computational effort.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2020-15115", "description": "etcd before versions 3.3.23 and 3.4.10 does not perform any password length validation, which allows for very short passwords, such as those with a length of one. This may allow an attacker to guess or brute-force users\u0027 passwords with little computational effort.", "id": "GSD-2020-15115", "references": [ "https://www.suse.com/security/cve/CVE-2020-15115.html", "https://access.redhat.com/errata/RHSA-2021:0916" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2020-15115" ], "details": "etcd before versions 3.3.23 and 3.4.10 does not perform any password length validation, which allows for very short passwords, such as those with a length of one. This may allow an attacker to guess or brute-force users\u0027 passwords with little computational effort.", "id": "GSD-2020-15115", "modified": "2023-12-13T01:21:43.843326Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2020-15115", "STATE": "PUBLIC", "TITLE": "No minimum password length in etcd" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "etcd", "version": { "version_data": [ { "version_value": "\u003c 3.3.23" }, { "version_value": "\u003c 3.4.10" } ] } } ] }, "vendor_name": "etcd-io" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "etcd before versions 3.3.23 and 3.4.10 does not perform any password length validation, which allows for very short passwords, such as those with a length of one. This may allow an attacker to guess or brute-force users\u0027 passwords with little computational effort." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "{\"CWE-521\":\"Weak Password Requirements\"}" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/etcd-io/etcd/security/advisories/GHSA-4993-m7g5-r9hh", "refsource": "CONFIRM", "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-4993-m7g5-r9hh" }, { "name": "FEDORA-2020-cd43b84c16", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP/" } ] }, "source": { "advisory": "GHSA-4993-m7g5-r9hh", "discovery": "UNKNOWN" } }, "gitlab.com": { "advisories": [ { "affected_range": "\u003e=v3.3.0 \u003cv3.3.23 || \u003e=v3.4.0 \u003cv3.4.10", "affected_versions": "All versions starting from 3.3.0 before 3.3.23, all versions starting from 3.4.0 before 3.4.10", "cvss_v2": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "cwe_ids": [ "CWE-1035", "CWE-521", "CWE-937" ], "date": "2021-01-04", "description": "etcd does not perform any password length validation, which allows for very short passwords, such as those with a length of one. This may allow an attacker to guess or brute-force users\u0027 passwords with little computational effort.", "fixed_versions": [ "v3.4.10" ], "identifier": "CVE-2020-15115", "identifiers": [ "CVE-2020-15115", "GHSA-4993-m7g5-r9hh" ], "not_impacted": "All versions before 3.3.0, all versions starting from 3.3.23 before 3.4.0, all versions starting from 3.4.10", "package_slug": "go/github.com/etcd-io/etcd", "pubdate": "2020-08-06", "solution": "Upgrade to version v3.4.10 or above.", "title": "Weak Password Requirements", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-15115" ], "uuid": "f87fcaef-a916-4c33-b8e1-a90632690e6b", "versions": [ { "commit": { "sha": "b8115a53c8b3e6997c4411090d66573a887f2c22", "tags": [ "v3.3.0" ], "timestamp": "20180201180336" }, "number": "v3.3.0" }, { "commit": { "sha": "bcb01e90afa04e641f033e2d34e6e25fd644cada", "tags": [ "v3.4.0" ], "timestamp": "20190830150955" }, "number": "v3.4.0" }, { "commit": { "sha": "8e1d87f46bea68e610556ba8363798dadbe98785", "tags": [ "v3.3.23" ], "timestamp": "20200716221548" }, "number": "v3.3.23" }, { "commit": { "sha": "33abd526eb9d5a0114ccfdda0d9033a7cab54018", "tags": [ "v3.4.10" ], "timestamp": "20200716221620" }, "number": "v3.4.10" } ] }, { "affected_range": "\u003c3.3.23||\u003e=3.4.0 \u003c3.4.10", "affected_versions": "All versions before 3.3.23, all versions starting from 3.4.0 before 3.4.10", "cvss_v2": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "cwe_ids": [ "CWE-1035", "CWE-521", "CWE-937" ], "date": "2022-10-06", "description": "etcd before versions 3.3.23 and 3.4.10 does not perform any password length validation, which allows for very short passwords, such as those with a length of one. This may allow an attacker to guess or brute-force users\u0027 passwords with little computational effort.", "fixed_versions": [ "3.3.23", "3.4.10" ], "identifier": "CVE-2020-15115", "identifiers": [ "GHSA-4993-m7g5-r9hh", "CVE-2020-15115" ], "not_impacted": "All versions starting from 3.3.23 before 3.4.0, all versions starting from 3.4.10", "package_slug": "go/go.etcd.io/etcd/client/v3", "pubdate": "2022-10-06", "solution": "Upgrade to versions 3.3.23, 3.4.10 or above.", "title": "Weak Password Requirements", "urls": [ "https://github.com/etcd-io/etcd/security/advisories/GHSA-4993-m7g5-r9hh", "https://nvd.nist.gov/vuln/detail/CVE-2020-15115", "https://github.com/advisories/GHSA-4993-m7g5-r9hh" ], "uuid": "86dddc48-1456-40bb-a007-074dcda31d4e" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:redhat:etcd:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.4.10", "versionStartIncluding": "3.4.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:etcd:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.3.23", "versionStartIncluding": "3.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2020-15115" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "etcd before versions 3.3.23 and 3.4.10 does not perform any password length validation, which allows for very short passwords, such as those with a length of one. This may allow an attacker to guess or brute-force users\u0027 passwords with little computational effort." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-521" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/etcd-io/etcd/security/advisories/GHSA-4993-m7g5-r9hh", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-4993-m7g5-r9hh" }, { "name": "FEDORA-2020-cd43b84c16", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP/" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } }, "lastModifiedDate": "2022-11-21T20:36Z", "publishedDate": "2020-08-06T22:15Z" } } }
ghsa-4993-m7g5-r9hh
Vulnerability from github
Published
2022-10-06 23:14
Modified
2022-10-06 23:14
Severity ?
Summary
etcd has no minimum password length
Details
Vulnerability type
Access Control
Workarounds
The etcdctl and etcd API do not enforce a specific password length during user creation or user password update operations. It is the responsibility of the administrator to enforce these requirements.
Detail
etcd does not perform any password length validation, which allows for very short passwords, such as those with a length of one. This may allow an attacker to guess or brute-force users’ passwords with little computational effort.
References
Find out more on this vulnerability in the security audit report
For more information
If you have any questions or comments about this advisory: * Contact the etcd security committee
{ "affected": [ { "package": { "ecosystem": "Go", "name": "go.etcd.io/etcd/client/v3" }, "ranges": [ { "events": [ { "introduced": "3.4.0" }, { "fixed": "3.4.10" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Go", "name": "go.etcd.io/etcd/client/v3" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "3.3.23" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2020-15115" ], "database_specific": { "cwe_ids": [ "CWE-521" ], "github_reviewed": true, "github_reviewed_at": "2022-10-06T23:14:23Z", "nvd_published_at": "2020-08-06T22:15:00Z", "severity": "MODERATE" }, "details": "### Vulnerability type\nAccess Control\n\n### Workarounds\nThe etcdctl and etcd API do not enforce a specific password length during user creation or user password update operations. [It is the responsibility of the administrator to enforce these requirements](https://github.com/etcd-io/etcd/blob/master/Documentation/op-guide/authentication.md#notes-on-password-strength).\n\n### Detail\netcd does not perform any password length validation, which allows for very short passwords, such as those with a length of one. This may allow an attacker to guess or brute-force users\u2019 passwords with little computational effort.\n\n### References\nFind out more on this vulnerability in the [security audit report](https://github.com/etcd-io/etcd/blob/master/security/SECURITY_AUDIT.pdf)\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Contact the [etcd security committee](https://github.com/etcd-io/etcd/blob/master/security/security-release-process.md#product-security-committee-psc)", "id": "GHSA-4993-m7g5-r9hh", "modified": "2022-10-06T23:14:23Z", "published": "2022-10-06T23:14:23Z", "references": [ { "type": "WEB", "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-4993-m7g5-r9hh" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15115" }, { "type": "PACKAGE", "url": "https://github.com/etcd-io/etcd" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "type": "CVSS_V3" } ], "summary": "etcd has no minimum password length" }
rhsa-2021_0916
Vulnerability from csaf_redhat
Published
2021-03-17 15:08
Modified
2024-12-20 19:26
Summary
Red Hat Security Advisory: Red Hat OpenStack Platform 16.1.4 (etcd) security update
Notes
Topic
An update for etcd is now available for Red Hat OpenStack Platform 16.1
(Train).
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
Details
A highly-available key value store for shared configuration.
Security Fix(es):
* large slice causes panic in decodeRecord method (CVE-2020-15106)
* DoS in wal/wal.go (CVE-2020-15112)
* directories created via os.MkdirAll are not checked for permissions
(CVE-2020-15113)
* gateway can include itself as an endpoint resulting in resource
exhaustion and leads to DoS (CVE-2020-15114)
* improper validation of passwords allow an attacker to guess or
brute-force user's passwords (CVE-2020-15115)
* no authentication is performed against endpoints provided in the
--endpoints flag (CVE-2020-15136)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for etcd is now available for Red Hat OpenStack Platform 16.1\n(Train).\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "A highly-available key value store for shared configuration.\n\nSecurity Fix(es):\n\n* large slice causes panic in decodeRecord method (CVE-2020-15106)\n\n* DoS in wal/wal.go (CVE-2020-15112)\n\n* directories created via os.MkdirAll are not checked for permissions\n(CVE-2020-15113)\n\n* gateway can include itself as an endpoint resulting in resource\nexhaustion and leads to DoS (CVE-2020-15114)\n\n* improper validation of passwords allow an attacker to guess or\nbrute-force user\u0027s passwords (CVE-2020-15115)\n\n* no authentication is performed against endpoints provided in the\n--endpoints flag (CVE-2020-15136)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0916", "url": "https://access.redhat.com/errata/RHSA-2021:0916" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1868870", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868870" }, { "category": "external", "summary": "1868872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868872" }, { "category": "external", "summary": "1868874", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868874" }, { "category": "external", "summary": "1868878", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868878" }, { "category": "external", "summary": "1868880", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868880" }, { "category": "external", "summary": "1868883", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868883" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0916.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenStack Platform 16.1.4 (etcd) security update", "tracking": { "current_release_date": "2024-12-20T19:26:56+00:00", "generator": { "date": "2024-12-20T19:26:56+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.4" } }, "id": "RHSA-2021:0916", "initial_release_date": "2021-03-17T15:08:12+00:00", "revision_history": [ { "date": "2021-03-17T15:08:12+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-03-17T15:08:12+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-20T19:26:56+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenStack Platform 16.1", "product": { "name": "Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:16.1::el8" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "etcd-0:3.3.23-1.el8ost.src", "product": { "name": "etcd-0:3.3.23-1.el8ost.src", "product_id": "etcd-0:3.3.23-1.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd@3.3.23-1.el8ost?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "etcd-0:3.3.23-1.el8ost.x86_64", "product": { "name": "etcd-0:3.3.23-1.el8ost.x86_64", "product_id": "etcd-0:3.3.23-1.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd@3.3.23-1.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "etcd-debugsource-0:3.3.23-1.el8ost.x86_64", "product": { "name": "etcd-debugsource-0:3.3.23-1.el8ost.x86_64", "product_id": "etcd-debugsource-0:3.3.23-1.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd-debugsource@3.3.23-1.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "product": { "name": "etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "product_id": "etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd-debuginfo@3.3.23-1.el8ost?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "etcd-0:3.3.23-1.el8ost.ppc64le", "product": { "name": "etcd-0:3.3.23-1.el8ost.ppc64le", "product_id": "etcd-0:3.3.23-1.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd@3.3.23-1.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "product": { "name": "etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "product_id": "etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd-debugsource@3.3.23-1.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "product": { "name": "etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "product_id": "etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd-debuginfo@3.3.23-1.el8ost?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "etcd-0:3.3.23-1.el8ost.ppc64le as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le" }, "product_reference": "etcd-0:3.3.23-1.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "etcd-0:3.3.23-1.el8ost.src as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src" }, "product_reference": "etcd-0:3.3.23-1.el8ost.src", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "etcd-0:3.3.23-1.el8ost.x86_64 as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64" }, "product_reference": "etcd-0:3.3.23-1.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le" }, "product_reference": "etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "etcd-debuginfo-0:3.3.23-1.el8ost.x86_64 as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64" }, "product_reference": "etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "etcd-debugsource-0:3.3.23-1.el8ost.ppc64le as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le" }, "product_reference": "etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "etcd-debugsource-0:3.3.23-1.el8ost.x86_64 as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" }, "product_reference": "etcd-debugsource-0:3.3.23-1.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOS-16.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-15106", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-08-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1868883" } ], "notes": [ { "category": "description", "text": "A flaw was found In etcd, where a large slice causes panic in the decodeRecord method. The size of a record is stored in the length field of a WAL file, and no additional validation is performed on this data. Therefore, it is possible to forge an extremely large frame size that can unintentionally panic at the expense of any RAFT participant trying to decode the WAL. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "etcd: Large slice causes panic in decodeRecord method", "title": "Vulnerability summary" }, { "category": "other", "text": "* In Red Hat OpenShift Container Platform (RHOCP), the affected components are behind OpenShift OAuth authentication. This restricts access to the vulnerable etcd to authenticated users only.\n* In Red Hat OpenStack Platform (RHOSP), the use of etcd is limited to the internal API network, which is not accessible to OpenStack tenants.\n\nThe security impact for these products is therefore rated as Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15106" }, { "category": "external", "summary": "RHBZ#1868883", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868883" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15106", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15106" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15106", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15106" }, { "category": "external", "summary": "https://github.com/etcd-io/etcd/security/advisories/GHSA-p4g4-wgrh-qrg2", "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-p4g4-wgrh-qrg2" } ], "release_date": "2020-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-17T15:08:12+00:00", "details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0916" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "etcd: Large slice causes panic in decodeRecord method" }, { "cve": "CVE-2020-15112", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-08-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1868872" } ], "notes": [ { "category": "description", "text": "A flaw was found in etcd, where it is possible to have an entry index greater than the number of entries in the ReadAll method in wal/wal.go. This can cause issues when WAL entries are being read during consensus, as an arbitrary etcd consensus participant can go down from a runtime panic when reading the entry. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "etcd: DoS in wal/wal.go", "title": "Vulnerability summary" }, { "category": "other", "text": "In Red Hat OpenShift Container Platform (RHOCP), the affected components are behind OpenShift OAuth authentication. This restricts access to the vulnerable etcd to authenticated users only, therefore the impact of this vulnerability is Low.\nA similar access restriction is in place in Red Hat OpenStack Platform (RHOSP) as etcd is limited to use within the internal API network, which is not accessible to any OpenStack tenants.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15112" }, { "category": "external", "summary": "RHBZ#1868872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868872" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15112", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15112" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15112", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15112" }, { "category": "external", "summary": "https://github.com/etcd-io/etcd/security/advisories/GHSA-m332-53r6-2w93", "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-m332-53r6-2w93" } ], "release_date": "2020-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-17T15:08:12+00:00", "details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0916" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "etcd: DoS in wal/wal.go" }, { "cve": "CVE-2020-15113", "cwe": { "id": "CWE-285", "name": "Improper Authorization" }, "discovery_date": "2020-08-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1868870" } ], "notes": [ { "category": "description", "text": "A flaw was found in etcd. Certain directory paths are created with restricted access permissions (700) by using the os.MkdirAll. This function does not perform any permission checks when a given directory path exists already.", "title": "Vulnerability description" }, { "category": "summary", "text": "etcd: directories created via os.MkdirAll are not checked for permissions", "title": "Vulnerability summary" }, { "category": "other", "text": "In Red Hat OpenShift Container Platform (RHOCP) the affected components are behind OpenShift OAuth authentication. This restricts access to the vulnerable etcd to authenticated users only, therefore the impact by this vulnerability is Low.\nA similar access restriction is in place in Red Hat OpenStack Platform (RHOSP) as etcd is limited to use within the internal API network, which is not accessible to any OpenStack tenants.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15113" }, { "category": "external", "summary": "RHBZ#1868870", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868870" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15113", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15113" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15113", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15113" }, { "category": "external", "summary": "https://github.com/etcd-io/etcd/security/advisories/GHSA-chh6-ppwq-jh92", "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-chh6-ppwq-jh92" } ], "release_date": "2020-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-17T15:08:12+00:00", "details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0916" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "etcd: directories created via os.MkdirAll are not checked for permissions" }, { "cve": "CVE-2020-15114", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-08-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1868874" } ], "notes": [ { "category": "description", "text": "A flaw was found in etcd, where the etcd gateway is a simple TCP proxy that allows basic service discovery and access. However, it is possible to include the gateway address as an endpoint. This issue results in a denial of service since the endpoint can become stuck in a loop of requesting itself until there are no more available file descriptors to accept connections on the gateway. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "etcd: gateway can include itself as an endpoint resulting in resource exhaustion and leads to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "In the Red Hat OpenShift Container Platform (RHOCP), the vulnerable ectd is used in the ose-etcd-container. The etcd gateway uses version 2 API which is not used by OCP, hence the impact of this vulnerability is Low.\nIn Red Hat OpenStack Platform (RHOSP) does not use the etcd gateway and as well its use is limited to within the internal API network, which is not accessible to any OpenStack tenants.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15114" }, { "category": "external", "summary": "RHBZ#1868874", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868874" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15114", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15114" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15114", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15114" }, { "category": "external", "summary": "https://github.com/etcd-io/etcd/security/advisories/GHSA-2xhq-gv6c-p224", "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-2xhq-gv6c-p224" } ], "release_date": "2020-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-17T15:08:12+00:00", "details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0916" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "etcd: gateway can include itself as an endpoint resulting in resource exhaustion and leads to DoS" }, { "cve": "CVE-2020-15115", "cwe": { "id": "CWE-305", "name": "Authentication Bypass by Primary Weakness" }, "discovery_date": "2020-08-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1868878" } ], "notes": [ { "category": "description", "text": "A flaw was found in etcd, where it does not perform any password length validation, which allows for very short passwords, such as those with a length of one. This flaw allows an attacker to guess or brute-force users\u0027 passwords with little computational effort. The highest threat from this vulnerability is to confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "etcd: improper validation of passwords allow an attacker to guess or brute-force user\u0027s passwords", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenShift Container Platform (RHOCP) doesn\u0027t use etcd role-based access control (rbac), instead of that, OpenShift OAuth authentication is used. Therefore, RHOCP is not affected by this vulnerability.\nA similar configuration is in place in Red Hat OpenStack Platform (RHOSP) as etcd does not use a password for access and instead uses a TLS certificate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15115" }, { "category": "external", "summary": "RHBZ#1868878", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868878" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15115", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15115" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15115", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15115" }, { "category": "external", "summary": "https://github.com/etcd-io/etcd/security/advisories/GHSA-4993-m7g5-r9hh", "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-4993-m7g5-r9hh" } ], "release_date": "2020-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-17T15:08:12+00:00", "details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0916" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "etcd: improper validation of passwords allow an attacker to guess or brute-force user\u0027s passwords" }, { "cve": "CVE-2020-15136", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2020-08-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1868880" } ], "notes": [ { "category": "description", "text": "A flaw was found in etcd. The gateway TLS authentication is only applied to endpoints detected in DNS SRV records. When starting a gateway, TLS authentication will only be attempted on endpoints identified in DNS SRV records for a given domain, which occurs in the discoverEndpoints function. No authentication is performed against endpoints provided in the --endpoints flag.", "title": "Vulnerability description" }, { "category": "summary", "text": "etcd: no authentication is performed against endpoints provided in the --endpoints flag", "title": "Vulnerability summary" }, { "category": "other", "text": "In Red Hat OpenShift Container Platform (RHOCP) the affected components are behind OpenShift OAuth authentication. This restricts access to the vulnerable etcd to authenticated users only, therefore the impact by this vulnerability is Low.\nA similar access restriction is in place in Red Hat OpenStack Platform (RHOSP) as etcd is limited to use within the internal API network, which is not accessible to any OpenStack tenants. Additionally, RHOSP does not use the etcd gateway.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15136" }, { "category": "external", "summary": "RHBZ#1868880", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868880" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15136", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15136" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15136", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15136" }, { "category": "external", "summary": "https://github.com/etcd-io/etcd/security/advisories/GHSA-wr2v-9rpq-c35q", "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-wr2v-9rpq-c35q" } ], "release_date": "2020-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-17T15:08:12+00:00", "details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0916" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "etcd: no authentication is performed against endpoints provided in the --endpoints flag" } ] }
rhsa-2021:0916
Vulnerability from csaf_redhat
Published
2021-03-17 15:08
Modified
2024-12-20 19:26
Summary
Red Hat Security Advisory: Red Hat OpenStack Platform 16.1.4 (etcd) security update
Notes
Topic
An update for etcd is now available for Red Hat OpenStack Platform 16.1
(Train).
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
Details
A highly-available key value store for shared configuration.
Security Fix(es):
* large slice causes panic in decodeRecord method (CVE-2020-15106)
* DoS in wal/wal.go (CVE-2020-15112)
* directories created via os.MkdirAll are not checked for permissions
(CVE-2020-15113)
* gateway can include itself as an endpoint resulting in resource
exhaustion and leads to DoS (CVE-2020-15114)
* improper validation of passwords allow an attacker to guess or
brute-force user's passwords (CVE-2020-15115)
* no authentication is performed against endpoints provided in the
--endpoints flag (CVE-2020-15136)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for etcd is now available for Red Hat OpenStack Platform 16.1\n(Train).\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "A highly-available key value store for shared configuration.\n\nSecurity Fix(es):\n\n* large slice causes panic in decodeRecord method (CVE-2020-15106)\n\n* DoS in wal/wal.go (CVE-2020-15112)\n\n* directories created via os.MkdirAll are not checked for permissions\n(CVE-2020-15113)\n\n* gateway can include itself as an endpoint resulting in resource\nexhaustion and leads to DoS (CVE-2020-15114)\n\n* improper validation of passwords allow an attacker to guess or\nbrute-force user\u0027s passwords (CVE-2020-15115)\n\n* no authentication is performed against endpoints provided in the\n--endpoints flag (CVE-2020-15136)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0916", "url": "https://access.redhat.com/errata/RHSA-2021:0916" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1868870", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868870" }, { "category": "external", "summary": "1868872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868872" }, { "category": "external", "summary": "1868874", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868874" }, { "category": "external", "summary": "1868878", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868878" }, { "category": "external", "summary": "1868880", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868880" }, { "category": "external", "summary": "1868883", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868883" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0916.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenStack Platform 16.1.4 (etcd) security update", "tracking": { "current_release_date": "2024-12-20T19:26:56+00:00", "generator": { "date": "2024-12-20T19:26:56+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.4" } }, "id": "RHSA-2021:0916", "initial_release_date": "2021-03-17T15:08:12+00:00", "revision_history": [ { "date": "2021-03-17T15:08:12+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-03-17T15:08:12+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-20T19:26:56+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenStack Platform 16.1", "product": { "name": "Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:16.1::el8" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "etcd-0:3.3.23-1.el8ost.src", "product": { "name": "etcd-0:3.3.23-1.el8ost.src", "product_id": "etcd-0:3.3.23-1.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd@3.3.23-1.el8ost?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "etcd-0:3.3.23-1.el8ost.x86_64", "product": { "name": "etcd-0:3.3.23-1.el8ost.x86_64", "product_id": "etcd-0:3.3.23-1.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd@3.3.23-1.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "etcd-debugsource-0:3.3.23-1.el8ost.x86_64", "product": { "name": "etcd-debugsource-0:3.3.23-1.el8ost.x86_64", "product_id": "etcd-debugsource-0:3.3.23-1.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd-debugsource@3.3.23-1.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "product": { "name": "etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "product_id": "etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd-debuginfo@3.3.23-1.el8ost?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "etcd-0:3.3.23-1.el8ost.ppc64le", "product": { "name": "etcd-0:3.3.23-1.el8ost.ppc64le", "product_id": "etcd-0:3.3.23-1.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd@3.3.23-1.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "product": { "name": "etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "product_id": "etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd-debugsource@3.3.23-1.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "product": { "name": "etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "product_id": "etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd-debuginfo@3.3.23-1.el8ost?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "etcd-0:3.3.23-1.el8ost.ppc64le as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le" }, "product_reference": "etcd-0:3.3.23-1.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "etcd-0:3.3.23-1.el8ost.src as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src" }, "product_reference": "etcd-0:3.3.23-1.el8ost.src", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "etcd-0:3.3.23-1.el8ost.x86_64 as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64" }, "product_reference": "etcd-0:3.3.23-1.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le" }, "product_reference": "etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "etcd-debuginfo-0:3.3.23-1.el8ost.x86_64 as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64" }, "product_reference": "etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "etcd-debugsource-0:3.3.23-1.el8ost.ppc64le as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le" }, "product_reference": "etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "etcd-debugsource-0:3.3.23-1.el8ost.x86_64 as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" }, "product_reference": "etcd-debugsource-0:3.3.23-1.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOS-16.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-15106", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-08-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1868883" } ], "notes": [ { "category": "description", "text": "A flaw was found In etcd, where a large slice causes panic in the decodeRecord method. The size of a record is stored in the length field of a WAL file, and no additional validation is performed on this data. Therefore, it is possible to forge an extremely large frame size that can unintentionally panic at the expense of any RAFT participant trying to decode the WAL. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "etcd: Large slice causes panic in decodeRecord method", "title": "Vulnerability summary" }, { "category": "other", "text": "* In Red Hat OpenShift Container Platform (RHOCP), the affected components are behind OpenShift OAuth authentication. This restricts access to the vulnerable etcd to authenticated users only.\n* In Red Hat OpenStack Platform (RHOSP), the use of etcd is limited to the internal API network, which is not accessible to OpenStack tenants.\n\nThe security impact for these products is therefore rated as Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15106" }, { "category": "external", "summary": "RHBZ#1868883", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868883" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15106", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15106" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15106", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15106" }, { "category": "external", "summary": "https://github.com/etcd-io/etcd/security/advisories/GHSA-p4g4-wgrh-qrg2", "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-p4g4-wgrh-qrg2" } ], "release_date": "2020-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-17T15:08:12+00:00", "details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0916" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "etcd: Large slice causes panic in decodeRecord method" }, { "cve": "CVE-2020-15112", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-08-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1868872" } ], "notes": [ { "category": "description", "text": "A flaw was found in etcd, where it is possible to have an entry index greater than the number of entries in the ReadAll method in wal/wal.go. This can cause issues when WAL entries are being read during consensus, as an arbitrary etcd consensus participant can go down from a runtime panic when reading the entry. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "etcd: DoS in wal/wal.go", "title": "Vulnerability summary" }, { "category": "other", "text": "In Red Hat OpenShift Container Platform (RHOCP), the affected components are behind OpenShift OAuth authentication. This restricts access to the vulnerable etcd to authenticated users only, therefore the impact of this vulnerability is Low.\nA similar access restriction is in place in Red Hat OpenStack Platform (RHOSP) as etcd is limited to use within the internal API network, which is not accessible to any OpenStack tenants.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15112" }, { "category": "external", "summary": "RHBZ#1868872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868872" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15112", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15112" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15112", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15112" }, { "category": "external", "summary": "https://github.com/etcd-io/etcd/security/advisories/GHSA-m332-53r6-2w93", "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-m332-53r6-2w93" } ], "release_date": "2020-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-17T15:08:12+00:00", "details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0916" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "etcd: DoS in wal/wal.go" }, { "cve": "CVE-2020-15113", "cwe": { "id": "CWE-285", "name": "Improper Authorization" }, "discovery_date": "2020-08-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1868870" } ], "notes": [ { "category": "description", "text": "A flaw was found in etcd. Certain directory paths are created with restricted access permissions (700) by using the os.MkdirAll. This function does not perform any permission checks when a given directory path exists already.", "title": "Vulnerability description" }, { "category": "summary", "text": "etcd: directories created via os.MkdirAll are not checked for permissions", "title": "Vulnerability summary" }, { "category": "other", "text": "In Red Hat OpenShift Container Platform (RHOCP) the affected components are behind OpenShift OAuth authentication. This restricts access to the vulnerable etcd to authenticated users only, therefore the impact by this vulnerability is Low.\nA similar access restriction is in place in Red Hat OpenStack Platform (RHOSP) as etcd is limited to use within the internal API network, which is not accessible to any OpenStack tenants.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15113" }, { "category": "external", "summary": "RHBZ#1868870", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868870" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15113", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15113" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15113", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15113" }, { "category": "external", "summary": "https://github.com/etcd-io/etcd/security/advisories/GHSA-chh6-ppwq-jh92", "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-chh6-ppwq-jh92" } ], "release_date": "2020-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-17T15:08:12+00:00", "details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0916" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "etcd: directories created via os.MkdirAll are not checked for permissions" }, { "cve": "CVE-2020-15114", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-08-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1868874" } ], "notes": [ { "category": "description", "text": "A flaw was found in etcd, where the etcd gateway is a simple TCP proxy that allows basic service discovery and access. However, it is possible to include the gateway address as an endpoint. This issue results in a denial of service since the endpoint can become stuck in a loop of requesting itself until there are no more available file descriptors to accept connections on the gateway. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "etcd: gateway can include itself as an endpoint resulting in resource exhaustion and leads to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "In the Red Hat OpenShift Container Platform (RHOCP), the vulnerable ectd is used in the ose-etcd-container. The etcd gateway uses version 2 API which is not used by OCP, hence the impact of this vulnerability is Low.\nIn Red Hat OpenStack Platform (RHOSP) does not use the etcd gateway and as well its use is limited to within the internal API network, which is not accessible to any OpenStack tenants.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15114" }, { "category": "external", "summary": "RHBZ#1868874", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868874" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15114", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15114" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15114", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15114" }, { "category": "external", "summary": "https://github.com/etcd-io/etcd/security/advisories/GHSA-2xhq-gv6c-p224", "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-2xhq-gv6c-p224" } ], "release_date": "2020-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-17T15:08:12+00:00", "details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0916" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "etcd: gateway can include itself as an endpoint resulting in resource exhaustion and leads to DoS" }, { "cve": "CVE-2020-15115", "cwe": { "id": "CWE-305", "name": "Authentication Bypass by Primary Weakness" }, "discovery_date": "2020-08-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1868878" } ], "notes": [ { "category": "description", "text": "A flaw was found in etcd, where it does not perform any password length validation, which allows for very short passwords, such as those with a length of one. This flaw allows an attacker to guess or brute-force users\u0027 passwords with little computational effort. The highest threat from this vulnerability is to confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "etcd: improper validation of passwords allow an attacker to guess or brute-force user\u0027s passwords", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenShift Container Platform (RHOCP) doesn\u0027t use etcd role-based access control (rbac), instead of that, OpenShift OAuth authentication is used. Therefore, RHOCP is not affected by this vulnerability.\nA similar configuration is in place in Red Hat OpenStack Platform (RHOSP) as etcd does not use a password for access and instead uses a TLS certificate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15115" }, { "category": "external", "summary": "RHBZ#1868878", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868878" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15115", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15115" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15115", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15115" }, { "category": "external", "summary": "https://github.com/etcd-io/etcd/security/advisories/GHSA-4993-m7g5-r9hh", "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-4993-m7g5-r9hh" } ], "release_date": "2020-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-17T15:08:12+00:00", "details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0916" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "etcd: improper validation of passwords allow an attacker to guess or brute-force user\u0027s passwords" }, { "cve": "CVE-2020-15136", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2020-08-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1868880" } ], "notes": [ { "category": "description", "text": "A flaw was found in etcd. The gateway TLS authentication is only applied to endpoints detected in DNS SRV records. When starting a gateway, TLS authentication will only be attempted on endpoints identified in DNS SRV records for a given domain, which occurs in the discoverEndpoints function. No authentication is performed against endpoints provided in the --endpoints flag.", "title": "Vulnerability description" }, { "category": "summary", "text": "etcd: no authentication is performed against endpoints provided in the --endpoints flag", "title": "Vulnerability summary" }, { "category": "other", "text": "In Red Hat OpenShift Container Platform (RHOCP) the affected components are behind OpenShift OAuth authentication. This restricts access to the vulnerable etcd to authenticated users only, therefore the impact by this vulnerability is Low.\nA similar access restriction is in place in Red Hat OpenStack Platform (RHOSP) as etcd is limited to use within the internal API network, which is not accessible to any OpenStack tenants. Additionally, RHOSP does not use the etcd gateway.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15136" }, { "category": "external", "summary": "RHBZ#1868880", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868880" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15136", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15136" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15136", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15136" }, { "category": "external", "summary": "https://github.com/etcd-io/etcd/security/advisories/GHSA-wr2v-9rpq-c35q", "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-wr2v-9rpq-c35q" } ], "release_date": "2020-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-17T15:08:12+00:00", "details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0916" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "etcd: no authentication is performed against endpoints provided in the --endpoints flag" } ] }
RHSA-2021:0916
Vulnerability from csaf_redhat
Published
2021-03-17 15:08
Modified
2024-12-20 19:26
Summary
Red Hat Security Advisory: Red Hat OpenStack Platform 16.1.4 (etcd) security update
Notes
Topic
An update for etcd is now available for Red Hat OpenStack Platform 16.1
(Train).
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
Details
A highly-available key value store for shared configuration.
Security Fix(es):
* large slice causes panic in decodeRecord method (CVE-2020-15106)
* DoS in wal/wal.go (CVE-2020-15112)
* directories created via os.MkdirAll are not checked for permissions
(CVE-2020-15113)
* gateway can include itself as an endpoint resulting in resource
exhaustion and leads to DoS (CVE-2020-15114)
* improper validation of passwords allow an attacker to guess or
brute-force user's passwords (CVE-2020-15115)
* no authentication is performed against endpoints provided in the
--endpoints flag (CVE-2020-15136)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for etcd is now available for Red Hat OpenStack Platform 16.1\n(Train).\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "A highly-available key value store for shared configuration.\n\nSecurity Fix(es):\n\n* large slice causes panic in decodeRecord method (CVE-2020-15106)\n\n* DoS in wal/wal.go (CVE-2020-15112)\n\n* directories created via os.MkdirAll are not checked for permissions\n(CVE-2020-15113)\n\n* gateway can include itself as an endpoint resulting in resource\nexhaustion and leads to DoS (CVE-2020-15114)\n\n* improper validation of passwords allow an attacker to guess or\nbrute-force user\u0027s passwords (CVE-2020-15115)\n\n* no authentication is performed against endpoints provided in the\n--endpoints flag (CVE-2020-15136)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0916", "url": "https://access.redhat.com/errata/RHSA-2021:0916" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1868870", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868870" }, { "category": "external", "summary": "1868872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868872" }, { "category": "external", "summary": "1868874", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868874" }, { "category": "external", "summary": "1868878", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868878" }, { "category": "external", "summary": "1868880", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868880" }, { "category": "external", "summary": "1868883", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868883" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0916.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenStack Platform 16.1.4 (etcd) security update", "tracking": { "current_release_date": "2024-12-20T19:26:56+00:00", "generator": { "date": "2024-12-20T19:26:56+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.4" } }, "id": "RHSA-2021:0916", "initial_release_date": "2021-03-17T15:08:12+00:00", "revision_history": [ { "date": "2021-03-17T15:08:12+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-03-17T15:08:12+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-20T19:26:56+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenStack Platform 16.1", "product": { "name": "Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:16.1::el8" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "etcd-0:3.3.23-1.el8ost.src", "product": { "name": "etcd-0:3.3.23-1.el8ost.src", "product_id": "etcd-0:3.3.23-1.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd@3.3.23-1.el8ost?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "etcd-0:3.3.23-1.el8ost.x86_64", "product": { "name": "etcd-0:3.3.23-1.el8ost.x86_64", "product_id": "etcd-0:3.3.23-1.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd@3.3.23-1.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "etcd-debugsource-0:3.3.23-1.el8ost.x86_64", "product": { "name": "etcd-debugsource-0:3.3.23-1.el8ost.x86_64", "product_id": "etcd-debugsource-0:3.3.23-1.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd-debugsource@3.3.23-1.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "product": { "name": "etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "product_id": "etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd-debuginfo@3.3.23-1.el8ost?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "etcd-0:3.3.23-1.el8ost.ppc64le", "product": { "name": "etcd-0:3.3.23-1.el8ost.ppc64le", "product_id": "etcd-0:3.3.23-1.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd@3.3.23-1.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "product": { "name": "etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "product_id": "etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd-debugsource@3.3.23-1.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "product": { "name": "etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "product_id": "etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd-debuginfo@3.3.23-1.el8ost?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "etcd-0:3.3.23-1.el8ost.ppc64le as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le" }, "product_reference": "etcd-0:3.3.23-1.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "etcd-0:3.3.23-1.el8ost.src as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src" }, "product_reference": "etcd-0:3.3.23-1.el8ost.src", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "etcd-0:3.3.23-1.el8ost.x86_64 as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64" }, "product_reference": "etcd-0:3.3.23-1.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le" }, "product_reference": "etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "etcd-debuginfo-0:3.3.23-1.el8ost.x86_64 as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64" }, "product_reference": "etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "etcd-debugsource-0:3.3.23-1.el8ost.ppc64le as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le" }, "product_reference": "etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "etcd-debugsource-0:3.3.23-1.el8ost.x86_64 as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" }, "product_reference": "etcd-debugsource-0:3.3.23-1.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOS-16.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-15106", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-08-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1868883" } ], "notes": [ { "category": "description", "text": "A flaw was found In etcd, where a large slice causes panic in the decodeRecord method. The size of a record is stored in the length field of a WAL file, and no additional validation is performed on this data. Therefore, it is possible to forge an extremely large frame size that can unintentionally panic at the expense of any RAFT participant trying to decode the WAL. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "etcd: Large slice causes panic in decodeRecord method", "title": "Vulnerability summary" }, { "category": "other", "text": "* In Red Hat OpenShift Container Platform (RHOCP), the affected components are behind OpenShift OAuth authentication. This restricts access to the vulnerable etcd to authenticated users only.\n* In Red Hat OpenStack Platform (RHOSP), the use of etcd is limited to the internal API network, which is not accessible to OpenStack tenants.\n\nThe security impact for these products is therefore rated as Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15106" }, { "category": "external", "summary": "RHBZ#1868883", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868883" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15106", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15106" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15106", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15106" }, { "category": "external", "summary": "https://github.com/etcd-io/etcd/security/advisories/GHSA-p4g4-wgrh-qrg2", "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-p4g4-wgrh-qrg2" } ], "release_date": "2020-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-17T15:08:12+00:00", "details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0916" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "etcd: Large slice causes panic in decodeRecord method" }, { "cve": "CVE-2020-15112", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-08-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1868872" } ], "notes": [ { "category": "description", "text": "A flaw was found in etcd, where it is possible to have an entry index greater than the number of entries in the ReadAll method in wal/wal.go. This can cause issues when WAL entries are being read during consensus, as an arbitrary etcd consensus participant can go down from a runtime panic when reading the entry. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "etcd: DoS in wal/wal.go", "title": "Vulnerability summary" }, { "category": "other", "text": "In Red Hat OpenShift Container Platform (RHOCP), the affected components are behind OpenShift OAuth authentication. This restricts access to the vulnerable etcd to authenticated users only, therefore the impact of this vulnerability is Low.\nA similar access restriction is in place in Red Hat OpenStack Platform (RHOSP) as etcd is limited to use within the internal API network, which is not accessible to any OpenStack tenants.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15112" }, { "category": "external", "summary": "RHBZ#1868872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868872" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15112", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15112" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15112", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15112" }, { "category": "external", "summary": "https://github.com/etcd-io/etcd/security/advisories/GHSA-m332-53r6-2w93", "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-m332-53r6-2w93" } ], "release_date": "2020-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-17T15:08:12+00:00", "details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0916" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "etcd: DoS in wal/wal.go" }, { "cve": "CVE-2020-15113", "cwe": { "id": "CWE-285", "name": "Improper Authorization" }, "discovery_date": "2020-08-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1868870" } ], "notes": [ { "category": "description", "text": "A flaw was found in etcd. Certain directory paths are created with restricted access permissions (700) by using the os.MkdirAll. This function does not perform any permission checks when a given directory path exists already.", "title": "Vulnerability description" }, { "category": "summary", "text": "etcd: directories created via os.MkdirAll are not checked for permissions", "title": "Vulnerability summary" }, { "category": "other", "text": "In Red Hat OpenShift Container Platform (RHOCP) the affected components are behind OpenShift OAuth authentication. This restricts access to the vulnerable etcd to authenticated users only, therefore the impact by this vulnerability is Low.\nA similar access restriction is in place in Red Hat OpenStack Platform (RHOSP) as etcd is limited to use within the internal API network, which is not accessible to any OpenStack tenants.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15113" }, { "category": "external", "summary": "RHBZ#1868870", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868870" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15113", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15113" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15113", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15113" }, { "category": "external", "summary": "https://github.com/etcd-io/etcd/security/advisories/GHSA-chh6-ppwq-jh92", "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-chh6-ppwq-jh92" } ], "release_date": "2020-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-17T15:08:12+00:00", "details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0916" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "etcd: directories created via os.MkdirAll are not checked for permissions" }, { "cve": "CVE-2020-15114", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-08-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1868874" } ], "notes": [ { "category": "description", "text": "A flaw was found in etcd, where the etcd gateway is a simple TCP proxy that allows basic service discovery and access. However, it is possible to include the gateway address as an endpoint. This issue results in a denial of service since the endpoint can become stuck in a loop of requesting itself until there are no more available file descriptors to accept connections on the gateway. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "etcd: gateway can include itself as an endpoint resulting in resource exhaustion and leads to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "In the Red Hat OpenShift Container Platform (RHOCP), the vulnerable ectd is used in the ose-etcd-container. The etcd gateway uses version 2 API which is not used by OCP, hence the impact of this vulnerability is Low.\nIn Red Hat OpenStack Platform (RHOSP) does not use the etcd gateway and as well its use is limited to within the internal API network, which is not accessible to any OpenStack tenants.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15114" }, { "category": "external", "summary": "RHBZ#1868874", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868874" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15114", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15114" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15114", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15114" }, { "category": "external", "summary": "https://github.com/etcd-io/etcd/security/advisories/GHSA-2xhq-gv6c-p224", "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-2xhq-gv6c-p224" } ], "release_date": "2020-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-17T15:08:12+00:00", "details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0916" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "etcd: gateway can include itself as an endpoint resulting in resource exhaustion and leads to DoS" }, { "cve": "CVE-2020-15115", "cwe": { "id": "CWE-305", "name": "Authentication Bypass by Primary Weakness" }, "discovery_date": "2020-08-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1868878" } ], "notes": [ { "category": "description", "text": "A flaw was found in etcd, where it does not perform any password length validation, which allows for very short passwords, such as those with a length of one. This flaw allows an attacker to guess or brute-force users\u0027 passwords with little computational effort. The highest threat from this vulnerability is to confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "etcd: improper validation of passwords allow an attacker to guess or brute-force user\u0027s passwords", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenShift Container Platform (RHOCP) doesn\u0027t use etcd role-based access control (rbac), instead of that, OpenShift OAuth authentication is used. Therefore, RHOCP is not affected by this vulnerability.\nA similar configuration is in place in Red Hat OpenStack Platform (RHOSP) as etcd does not use a password for access and instead uses a TLS certificate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15115" }, { "category": "external", "summary": "RHBZ#1868878", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868878" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15115", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15115" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15115", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15115" }, { "category": "external", "summary": "https://github.com/etcd-io/etcd/security/advisories/GHSA-4993-m7g5-r9hh", "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-4993-m7g5-r9hh" } ], "release_date": "2020-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-17T15:08:12+00:00", "details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0916" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "etcd: improper validation of passwords allow an attacker to guess or brute-force user\u0027s passwords" }, { "cve": "CVE-2020-15136", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2020-08-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1868880" } ], "notes": [ { "category": "description", "text": "A flaw was found in etcd. The gateway TLS authentication is only applied to endpoints detected in DNS SRV records. When starting a gateway, TLS authentication will only be attempted on endpoints identified in DNS SRV records for a given domain, which occurs in the discoverEndpoints function. No authentication is performed against endpoints provided in the --endpoints flag.", "title": "Vulnerability description" }, { "category": "summary", "text": "etcd: no authentication is performed against endpoints provided in the --endpoints flag", "title": "Vulnerability summary" }, { "category": "other", "text": "In Red Hat OpenShift Container Platform (RHOCP) the affected components are behind OpenShift OAuth authentication. This restricts access to the vulnerable etcd to authenticated users only, therefore the impact by this vulnerability is Low.\nA similar access restriction is in place in Red Hat OpenStack Platform (RHOSP) as etcd is limited to use within the internal API network, which is not accessible to any OpenStack tenants. Additionally, RHOSP does not use the etcd gateway.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15136" }, { "category": "external", "summary": "RHBZ#1868880", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868880" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15136", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15136" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15136", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15136" }, { "category": "external", "summary": "https://github.com/etcd-io/etcd/security/advisories/GHSA-wr2v-9rpq-c35q", "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-wr2v-9rpq-c35q" } ], "release_date": "2020-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-17T15:08:12+00:00", "details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0916" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.src", "8Base-RHOS-16.1:etcd-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-1.el8ost.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-1.el8ost.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "etcd: no authentication is performed against endpoints provided in the --endpoints flag" } ] }
fkie_cve-2020-15115
Vulnerability from fkie_nvd
Published
2020-08-06 22:15
Modified
2024-11-21 05:04
Severity ?
5.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
etcd before versions 3.3.23 and 3.4.10 does not perform any password length validation, which allows for very short passwords, such as those with a length of one. This may allow an attacker to guess or brute-force users' passwords with little computational effort.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:etcd:*:*:*:*:*:*:*:*", "matchCriteriaId": "44C58F4F-02EB-40DC-86CB-98D027FE7F84", "versionEndExcluding": "3.3.23", "versionStartIncluding": "3.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:etcd:*:*:*:*:*:*:*:*", "matchCriteriaId": "362ED3D1-DC14-4BC6-A565-39EA4CA7B061", "versionEndExcluding": "3.4.10", "versionStartIncluding": "3.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "etcd before versions 3.3.23 and 3.4.10 does not perform any password length validation, which allows for very short passwords, such as those with a length of one. This may allow an attacker to guess or brute-force users\u0027 passwords with little computational effort." }, { "lang": "es", "value": "etcd anterior a las versiones 3.3.23 y 3.4.10, no lleva a cabo ninguna comprobaci\u00f3n de longitud de contrase\u00f1a, lo que permite contrase\u00f1as muy cortas, como aquellas con una longitud de uno. Esto puede permitir a un atacante adivinar o forzar las contrase\u00f1as de los usuarios con poco esfuerzo computacional" } ], "id": "CVE-2020-15115", "lastModified": "2024-11-21T05:04:51.007", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-08-06T22:15:12.093", "references": [ { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-4993-m7g5-r9hh" }, { "source": "security-advisories@github.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-4993-m7g5-r9hh" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L6B6R43Y7M3DCHWK3L3UVGE2K6WWECMP/" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-521" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-521" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.