USN-5628-1: etcd vulnerabilities
22 September 2022
Several security issues were fixed in etcd.
Releases
Packages
- etcd - Transitional package for etcd-client and etcd-server
Details
It was discovered that etcd incorrectly handled certain specially crafted
WAL files. An attacker could possibly use this issue to cause a denial of
service. (CVE-2020-15106, CVE-2020-15112)
It was discovered that etcd incorrectly handled directory permissions when
trying to create a directory that exists already. An attacker could
possibly use this issue to obtain sensitive information. (CVE-2020-15113)
It was discovered that etcd incorrectly handled endpoint setup. An
attacker could possibly use this issue to cause a denial of
service. (CVE-2020-15114)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 20.04
-
etcd-server
-
3.2.26+dfsg-6ubuntu0.1
-
etcd-client
-
3.2.26+dfsg-6ubuntu0.1
-
etcd
-
3.2.26+dfsg-6ubuntu0.1
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-5628-2: etcd, etcd-client, etcd-server, golang-etcd-server-dev